ID CISCO-SA-20090325-SCPHTTP.NASL Type nessus Reporter This script is (C) 2010-2018 Tenable Network Security, Inc. Modified 2010-09-01T00:00:00
Description
The server side of the Secure Copy (SCP) implementation in Cisco IOS
software contains a vulnerability that could allow authenticated users
with an attached command-line interface (CLI) view to transfer files to
and from a Cisco IOS device that is configured to be an SCP server,
regardless of what users are authorized to do, per the CLI view
configuration. This vulnerability could allow valid users to retrieve
or write to any file on the device's file system, including the
device's saved configuration and Cisco IOS image files, even if the CLI
view attached to the user does not allow it. This configuration file
may include passwords or other sensitive information.
The Cisco IOS SCP server is an optional service that is disabled by
default. CLI views are a fundamental component of the Cisco IOS
Role-Based CLI Access feature, which is also disabled by default.
Devices that are not specifically configured to enable the Cisco IOS
SCP server, or that are configured to use it but do not use role-based
CLI access, are not affected by this vulnerability.
This vulnerability does not apply to the Cisco IOS SCP client feature.
Cisco has released free software updates that address this
vulnerability.
There are no workarounds available for this vulnerability apart from
disabling either the SCP server or the CLI view feature if these
services are not required by administrators.
#TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
# Security advisory is (C) CISCO, Inc.
# See https://www.cisco.com/en/US/products/products_security_advisory09186a0080a96c22.shtml
include("compat.inc");
if (description)
{
script_id(49032);
script_version("1.25");
script_set_attribute(attribute:"plugin_modification_date", value:"2018/11/15");
script_cve_id("CVE-2009-0637");
script_bugtraq_id(34247);
script_xref(name:"CISCO-BUG-ID", value:"CSCsv38166");
script_xref(name:"CISCO-SA", value:"cisco-sa-20090325-scp");
script_name(english:"Cisco IOS Software Secure Copy Privilege Escalation Vulnerability - Cisco Systems");
script_summary(english:"Checks IOS version");
script_set_attribute(attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"The server side of the Secure Copy (SCP) implementation in Cisco IOS
software contains a vulnerability that could allow authenticated users
with an attached command-line interface (CLI) view to transfer files to
and from a Cisco IOS device that is configured to be an SCP server,
regardless of what users are authorized to do, per the CLI view
configuration. This vulnerability could allow valid users to retrieve
or write to any file on the device's file system, including the
device's saved configuration and Cisco IOS image files, even if the CLI
view attached to the user does not allow it. This configuration file
may include passwords or other sensitive information.
The Cisco IOS SCP server is an optional service that is disabled by
default. CLI views are a fundamental component of the Cisco IOS
Role-Based CLI Access feature, which is also disabled by default.
Devices that are not specifically configured to enable the Cisco IOS
SCP server, or that are configured to use it but do not use role-based
CLI access, are not affected by this vulnerability.
This vulnerability does not apply to the Cisco IOS SCP client feature.
Cisco has released free software updates that address this
vulnerability.
There are no workarounds available for this vulnerability apart from
disabling either the SCP server or the CLI view feature if these
services are not required by administrators.");
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?511a752b");
# https://www.cisco.com/en/US/products/products_security_advisory09186a0080a96c22.shtml
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?244201aa");
script_set_attribute(attribute:"solution", value:
"Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090325-scp.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2009-0637");
script_set_attribute(attribute:"cvss_score_rationale", value:"This score is based on Cisco's own advisory (cisco-sa-20090325-scp)");
script_set_attribute(attribute:"vuln_publication_date", value:"2009/03/25");
script_set_attribute(attribute:"patch_publication_date", value:"2009/03/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/01");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is (C) 2010-2018 Tenable Network Security, Inc.");
script_family(english:"CISCO");
script_dependencie("cisco_ios_version.nasl");
script_require_keys("Host/Cisco/IOS/Version");
exit(0);
}
include("audit.inc");
include("cisco_func.inc");
include("cisco_kb_cmd_func.inc");
flag = 0;
override = 0;
version = get_kb_item_or_exit("Host/Cisco/IOS/Version");
if (version == '12.4(20)YA1') flag++;
else if (version == '12.4(20)YA') flag++;
else if (version == '12.4(15)XZ1') flag++;
else if (version == '12.4(15)XZ') flag++;
else if (version == '12.4(15)XY5') flag++;
else if (version == '12.4(15)XY4') flag++;
else if (version == '12.4(15)XY3') flag++;
else if (version == '12.4(15)XY2') flag++;
else if (version == '12.4(15)XY1') flag++;
else if (version == '12.4(15)XY') flag++;
else if (version == '12.4(11)XW9') flag++;
else if (version == '12.4(11)XW8') flag++;
else if (version == '12.4(11)XW7') flag++;
else if (version == '12.4(11)XW6') flag++;
else if (version == '12.4(11)XW5') flag++;
else if (version == '12.4(11)XW4') flag++;
else if (version == '12.4(11)XW3') flag++;
else if (version == '12.4(11)XW2') flag++;
else if (version == '12.4(11)XW1') flag++;
else if (version == '12.4(11)XW') flag++;
else if (version == '12.4(11)XV1') flag++;
else if (version == '12.4(11)XV') flag++;
else if (version == '12.4(6)XT2') flag++;
else if (version == '12.4(6)XT1') flag++;
else if (version == '12.4(6)XT') flag++;
else if (version == '12.4(15)XR4') flag++;
else if (version == '12.4(15)XR3') flag++;
else if (version == '12.4(15)XR2') flag++;
else if (version == '12.4(15)XR1') flag++;
else if (version == '12.4(15)XR') flag++;
else if (version == '12.4(15)XQ1') flag++;
else if (version == '12.4(15)XQ') flag++;
else if (version == '12.4(6)XP') flag++;
else if (version == '12.4(15)XN') flag++;
else if (version == '12.4(15)XM2') flag++;
else if (version == '12.4(15)XM1') flag++;
else if (version == '12.4(15)XM') flag++;
else if (version == '12.4(15)XL3') flag++;
else if (version == '12.4(15)XL2') flag++;
else if (version == '12.4(15)XL1') flag++;
else if (version == '12.4(15)XL') flag++;
else if (version == '12.4(14)XK') flag++;
else if (version == '12.4(11)XJ4') flag++;
else if (version == '12.4(11)XJ3') flag++;
else if (version == '12.4(11)XJ2') flag++;
else if (version == '12.4(11)XJ') flag++;
else if (version == '12.4(9)XG3') flag++;
else if (version == '12.4(9)XG2') flag++;
else if (version == '12.4(9)XG1') flag++;
else if (version == '12.4(9)XG') flag++;
else if (version == '12.4(15)XF') flag++;
else if (version == '12.4(6)XE3') flag++;
else if (version == '12.4(6)XE2') flag++;
else if (version == '12.4(6)XE1') flag++;
else if (version == '12.4(6)XE') flag++;
else if (version == '12.4(4)XD9') flag++;
else if (version == '12.4(4)XD8') flag++;
else if (version == '12.4(4)XD7') flag++;
else if (version == '12.4(4)XD5') flag++;
else if (version == '12.4(4)XD4') flag++;
else if (version == '12.4(4)XD2') flag++;
else if (version == '12.4(4)XD11') flag++;
else if (version == '12.4(4)XD10') flag++;
else if (version == '12.4(4)XD1') flag++;
else if (version == '12.4(4)XD') flag++;
else if (version == '12.4(4)XC7') flag++;
else if (version == '12.4(4)XC6') flag++;
else if (version == '12.4(4)XC5') flag++;
else if (version == '12.4(4)XC4') flag++;
else if (version == '12.4(4)XC3') flag++;
else if (version == '12.4(4)XC2') flag++;
else if (version == '12.4(4)XC1') flag++;
else if (version == '12.4(4)XC') flag++;
else if (version == '12.4(2)XB9') flag++;
else if (version == '12.4(2)XB8') flag++;
else if (version == '12.4(2)XB7') flag++;
else if (version == '12.4(2)XB6') flag++;
else if (version == '12.4(2)XB5') flag++;
else if (version == '12.4(2)XB4') flag++;
else if (version == '12.4(2)XB3') flag++;
else if (version == '12.4(2)XB2') flag++;
else if (version == '12.4(2)XB10') flag++;
else if (version == '12.4(2)XB1') flag++;
else if (version == '12.4(2)XB') flag++;
else if (version == '12.4(2)XA2') flag++;
else if (version == '12.4(2)XA1') flag++;
else if (version == '12.4(2)XA') flag++;
else if (version == '12.4(22)T') flag++;
else if (version == '12.4(20)T1') flag++;
else if (version == '12.4(20)T') flag++;
else if (version == '12.4(15)T8') flag++;
else if (version == '12.4(15)T7') flag++;
else if (version == '12.4(15)T6') flag++;
else if (version == '12.4(15)T5') flag++;
else if (version == '12.4(15)T4') flag++;
else if (version == '12.4(15)T3') flag++;
else if (version == '12.4(15)T2') flag++;
else if (version == '12.4(15)T1') flag++;
else if (version == '12.4(15)T') flag++;
else if (version == '12.4(11)T4') flag++;
else if (version == '12.4(11)T3') flag++;
else if (version == '12.4(11)T2') flag++;
else if (version == '12.4(11)T1') flag++;
else if (version == '12.4(11)T') flag++;
else if (version == '12.4(9)T7') flag++;
else if (version == '12.4(9)T6') flag++;
else if (version == '12.4(9)T5') flag++;
else if (version == '12.4(9)T4') flag++;
else if (version == '12.4(9)T3') flag++;
else if (version == '12.4(9)T2') flag++;
else if (version == '12.4(9)T1') flag++;
else if (version == '12.4(9)T') flag++;
else if (version == '12.4(6)T9') flag++;
else if (version == '12.4(6)T8') flag++;
else if (version == '12.4(6)T7') flag++;
else if (version == '12.4(6)T6') flag++;
else if (version == '12.4(6)T5') flag++;
else if (version == '12.4(6)T4') flag++;
else if (version == '12.4(6)T3') flag++;
else if (version == '12.4(6)T2') flag++;
else if (version == '12.4(6)T11') flag++;
else if (version == '12.4(6)T10') flag++;
else if (version == '12.4(6)T1') flag++;
else if (version == '12.4(6)T') flag++;
else if (version == '12.4(4)T8') flag++;
else if (version == '12.4(4)T7') flag++;
else if (version == '12.4(4)T6') flag++;
else if (version == '12.4(4)T5') flag++;
else if (version == '12.4(4)T4') flag++;
else if (version == '12.4(4)T3') flag++;
else if (version == '12.4(4)T2') flag++;
else if (version == '12.4(4)T1') flag++;
else if (version == '12.4(4)T') flag++;
else if (version == '12.4(2)T6') flag++;
else if (version == '12.4(2)T5') flag++;
else if (version == '12.4(2)T4') flag++;
else if (version == '12.4(2)T3') flag++;
else if (version == '12.4(2)T2') flag++;
else if (version == '12.4(2)T1') flag++;
else if (version == '12.4(2)T') flag++;
else if (version == '12.4(15)SW2') flag++;
else if (version == '12.4(15)SW1') flag++;
else if (version == '12.4(15)SW') flag++;
else if (version == '12.4(11)SW3') flag++;
else if (version == '12.4(11)SW2') flag++;
else if (version == '12.4(11)SW1') flag++;
else if (version == '12.4(11)SW') flag++;
else if (version == '12.4(19)MR1') flag++;
else if (version == '12.4(19)MR') flag++;
else if (version == '12.4(16)MR2') flag++;
else if (version == '12.4(16)MR1') flag++;
else if (version == '12.4(16)MR') flag++;
else if (version == '12.4(12)MR2') flag++;
else if (version == '12.4(12)MR1') flag++;
else if (version == '12.4(12)MR') flag++;
else if (version == '12.4(11)MR') flag++;
else if (version == '12.4(9)MR') flag++;
else if (version == '12.4(6)MR1') flag++;
else if (version == '12.4(6)MR') flag++;
else if (version == '12.4(4)MR1') flag++;
else if (version == '12.4(4)MR') flag++;
else if (version == '12.4(2)MR1') flag++;
else if (version == '12.4(2)MR') flag++;
else if (version == '12.4(22)MD') flag++;
else if (version == '12.4(15)MD2') flag++;
else if (version == '12.4(15)MD1') flag++;
else if (version == '12.4(15)MD') flag++;
else if (version == '12.4(11)MD6') flag++;
else if (version == '12.4(11)MD5') flag++;
else if (version == '12.4(11)MD4') flag++;
else if (version == '12.4(11)MD3') flag++;
else if (version == '12.4(11)MD2') flag++;
else if (version == '12.4(11)MD1') flag++;
else if (version == '12.4(11)MD') flag++;
else if (version == '12.4(10b)JX') flag++;
else if (version == '12.4(3g)JX1') flag++;
else if (version == '12.4(3g)JX') flag++;
else if (version == '12.4(3g)JMC2') flag++;
else if (version == '12.4(3g)JMC1') flag++;
else if (version == '12.4(3g)JMC') flag++;
else if (version == '12.4(3g)JMB') flag++;
else if (version == '12.4(3g)JMA1') flag++;
else if (version == '12.4(3g)JMA') flag++;
else if (version == '12.4(3)JL1') flag++;
else if (version == '12.4(3)JL') flag++;
else if (version == '12.4(3)JK3') flag++;
else if (version == '12.4(3)JK2') flag++;
else if (version == '12.4(3)JK1') flag++;
else if (version == '12.4(3)JK') flag++;
else if (version == '12.4(10b)JDA2') flag++;
else if (version == '12.4(10b)JDA1') flag++;
else if (version == '12.4(10b)JDA') flag++;
else if (version == '12.4(18a)JA1') flag++;
else if (version == '12.4(18a)JA') flag++;
else if (version == '12.4(16b)JA1') flag++;
else if (version == '12.4(16b)JA') flag++;
else if (version == '12.4(13d)JA') flag++;
else if (version == '12.4(10b)JA4') flag++;
else if (version == '12.4(10b)JA3') flag++;
else if (version == '12.4(10b)JA2') flag++;
else if (version == '12.4(10b)JA1') flag++;
else if (version == '12.4(10b)JA') flag++;
else if (version == '12.4(3g)JA2') flag++;
else if (version == '12.4(3g)JA1') flag++;
else if (version == '12.4(3g)JA') flag++;
else if (version == '12.4(23)') flag++;
else if (version == '12.4(21a)') flag++;
else if (version == '12.4(21)') flag++;
else if (version == '12.4(19b)') flag++;
else if (version == '12.4(19a)') flag++;
else if (version == '12.4(19)') flag++;
else if (version == '12.4(18c)') flag++;
else if (version == '12.4(18b)') flag++;
else if (version == '12.4(18a)') flag++;
else if (version == '12.4(18)') flag++;
else if (version == '12.4(17b)') flag++;
else if (version == '12.4(17a)') flag++;
else if (version == '12.4(17)') flag++;
else if (version == '12.4(16b)') flag++;
else if (version == '12.4(16a)') flag++;
else if (version == '12.4(16)') flag++;
else if (version == '12.4(13f)') flag++;
else if (version == '12.4(13e)') flag++;
else if (version == '12.4(13d)') flag++;
else if (version == '12.4(13c)') flag++;
else if (version == '12.4(13b)') flag++;
else if (version == '12.4(13a)') flag++;
else if (version == '12.4(13)') flag++;
else if (version == '12.4(12c)') flag++;
else if (version == '12.4(12b)') flag++;
else if (version == '12.4(12a)') flag++;
else if (version == '12.4(12)') flag++;
else if (version == '12.4(10c)') flag++;
else if (version == '12.4(10b)') flag++;
else if (version == '12.4(10a)') flag++;
else if (version == '12.4(10)') flag++;
else if (version == '12.4(8d)') flag++;
else if (version == '12.4(8c)') flag++;
else if (version == '12.4(8b)') flag++;
else if (version == '12.4(8a)') flag++;
else if (version == '12.4(8)') flag++;
else if (version == '12.4(7h)') flag++;
else if (version == '12.4(7g)') flag++;
else if (version == '12.4(7f)') flag++;
else if (version == '12.4(7e)') flag++;
else if (version == '12.4(7d)') flag++;
else if (version == '12.4(7c)') flag++;
else if (version == '12.4(7b)') flag++;
else if (version == '12.4(7a)') flag++;
else if (version == '12.4(7)') flag++;
else if (version == '12.4(5c)') flag++;
else if (version == '12.4(5b)') flag++;
else if (version == '12.4(5a)') flag++;
else if (version == '12.4(5)') flag++;
else if (version == '12.4(3j)') flag++;
else if (version == '12.4(3i)') flag++;
else if (version == '12.4(3h)') flag++;
else if (version == '12.4(3g)') flag++;
else if (version == '12.4(3f)') flag++;
else if (version == '12.4(3e)') flag++;
else if (version == '12.4(3d)') flag++;
else if (version == '12.4(3c)') flag++;
else if (version == '12.4(3b)') flag++;
else if (version == '12.4(3a)') flag++;
else if (version == '12.4(3)') flag++;
else if (version == '12.4(1c)') flag++;
else if (version == '12.4(1b)') flag++;
else if (version == '12.4(1a)') flag++;
else if (version == '12.4(1)') flag++;
else if (version == '12.3(8)ZA') flag++;
else if (version == '12.3(11)YZ2') flag++;
else if (version == '12.3(11)YZ1') flag++;
else if (version == '12.3(11)YZ') flag++;
else if (version == '12.3(14)YX9') flag++;
else if (version == '12.3(14)YX8') flag++;
else if (version == '12.3(14)YX7') flag++;
else if (version == '12.3(14)YX4') flag++;
else if (version == '12.3(14)YX3') flag++;
else if (version == '12.3(14)YX2') flag++;
else if (version == '12.3(14)YX13') flag++;
else if (version == '12.3(14)YX12') flag++;
else if (version == '12.3(14)YX11') flag++;
else if (version == '12.3(14)YX10') flag++;
else if (version == '12.3(14)YX1') flag++;
else if (version == '12.3(14)YX') flag++;
else if (version == '12.3(14)YU1') flag++;
else if (version == '12.3(14)YU') flag++;
else if (version == '12.3(14)YT1') flag++;
else if (version == '12.3(14)YT') flag++;
else if (version == '12.3(11)YS2') flag++;
else if (version == '12.3(11)YS1') flag++;
else if (version == '12.3(11)YS') flag++;
else if (version == '12.3(14)YQ8') flag++;
else if (version == '12.3(14)YQ7') flag++;
else if (version == '12.3(14)YQ6') flag++;
else if (version == '12.3(14)YQ5') flag++;
else if (version == '12.3(14)YQ4') flag++;
else if (version == '12.3(14)YQ3') flag++;
else if (version == '12.3(14)YQ2') flag++;
else if (version == '12.3(14)YQ1') flag++;
else if (version == '12.3(14)YQ') flag++;
else if (version == '12.3(14)YM9') flag++;
else if (version == '12.3(14)YM8') flag++;
else if (version == '12.3(14)YM7') flag++;
else if (version == '12.3(14)YM6') flag++;
else if (version == '12.3(14)YM5') flag++;
else if (version == '12.3(14)YM4') flag++;
else if (version == '12.3(14)YM3') flag++;
else if (version == '12.3(14)YM2') flag++;
else if (version == '12.3(14)YM12') flag++;
else if (version == '12.3(14)YM11') flag++;
else if (version == '12.3(14)YM10') flag++;
else if (version == '12.3(11)YK3') flag++;
else if (version == '12.3(11)YK2') flag++;
else if (version == '12.3(11)YK1') flag++;
else if (version == '12.3(11)YK') flag++;
else if (version == '12.3(11)YJ') flag++;
else if (version == '12.3(8)YI3') flag++;
else if (version == '12.3(8)YI2') flag++;
else if (version == '12.3(8)YI1') flag++;
else if (version == '12.3(8)YH') flag++;
else if (version == '12.3(8)YG6') flag++;
else if (version == '12.3(8)YG5') flag++;
else if (version == '12.3(8)YG4') flag++;
else if (version == '12.3(8)YG3') flag++;
else if (version == '12.3(8)YG2') flag++;
else if (version == '12.3(8)YG1') flag++;
else if (version == '12.3(8)YG') flag++;
else if (version == '12.3(11)YF4') flag++;
else if (version == '12.3(11)YF3') flag++;
else if (version == '12.3(11)YF2') flag++;
else if (version == '12.3(11)YF1') flag++;
else if (version == '12.3(11)YF') flag++;
else if (version == '12.3(8)YD1') flag++;
else if (version == '12.3(8)YD') flag++;
else if (version == '12.3(8)YA1') flag++;
else if (version == '12.3(8)YA') flag++;
else if (version == '12.3(8)XY7') flag++;
else if (version == '12.3(8)XY6') flag++;
else if (version == '12.3(8)XY5') flag++;
else if (version == '12.3(8)XY4') flag++;
else if (version == '12.3(8)XY3') flag++;
else if (version == '12.3(8)XY2') flag++;
else if (version == '12.3(8)XY1') flag++;
else if (version == '12.3(8)XY') flag++;
else if (version == '12.3(8)XX2d') flag++;
else if (version == '12.3(8)XX1') flag++;
else if (version == '12.3(8)XX') flag++;
else if (version == '12.3(8)XW3') flag++;
else if (version == '12.3(8)XW2') flag++;
else if (version == '12.3(8)XW1') flag++;
else if (version == '12.3(8)XW') flag++;
else if (version == '12.3(8)XU5') flag++;
else if (version == '12.3(8)XU4') flag++;
else if (version == '12.3(8)XU3') flag++;
else if (version == '12.3(8)XU2') flag++;
else if (version == '12.3(8)XU1') flag++;
else if (version == '12.3(8)XU') flag++;
else if (version == '12.3(7)XS2') flag++;
else if (version == '12.3(7)XS1') flag++;
else if (version == '12.3(7)XS') flag++;
else if (version == '12.3(7)XR7') flag++;
else if (version == '12.3(7)XR6') flag++;
else if (version == '12.3(7)XR5') flag++;
else if (version == '12.3(7)XR4') flag++;
else if (version == '12.3(7)XR3') flag++;
else if (version == '12.3(7)XR2') flag++;
else if (version == '12.3(7)XR') flag++;
else if (version == '12.3(4)XQ1') flag++;
else if (version == '12.3(4)XQ') flag++;
else if (version == '12.3(11)XL1') flag++;
else if (version == '12.3(11)XL') flag++;
else if (version == '12.3(4)XK4') flag++;
else if (version == '12.3(4)XK3') flag++;
else if (version == '12.3(4)XK2') flag++;
else if (version == '12.3(4)XK1') flag++;
else if (version == '12.3(4)XK') flag++;
else if (version == '12.3(7)XJ2') flag++;
else if (version == '12.3(7)XJ1') flag++;
else if (version == '12.3(7)XJ') flag++;
else if (version == '12.3(7)XI9') flag++;
else if (version == '12.3(7)XI8d') flag++;
else if (version == '12.3(7)XI8c') flag++;
else if (version == '12.3(7)XI8a') flag++;
else if (version == '12.3(7)XI8') flag++;
else if (version == '12.3(7)XI7b') flag++;
else if (version == '12.3(7)XI7a') flag++;
else if (version == '12.3(7)XI7') flag++;
else if (version == '12.3(7)XI6') flag++;
else if (version == '12.3(7)XI5') flag++;
else if (version == '12.3(7)XI4') flag++;
else if (version == '12.3(7)XI3') flag++;
else if (version == '12.3(7)XI2a') flag++;
else if (version == '12.3(7)XI2') flag++;
else if (version == '12.3(7)XI10a') flag++;
else if (version == '12.3(7)XI10') flag++;
else if (version == '12.3(7)XI1c') flag++;
else if (version == '12.3(7)XI1b') flag++;
else if (version == '12.3(7)XI1') flag++;
else if (version == '12.3(4)XG5') flag++;
else if (version == '12.3(4)XG4') flag++;
else if (version == '12.3(4)XG3') flag++;
else if (version == '12.3(4)XG2') flag++;
else if (version == '12.3(4)XG1') flag++;
else if (version == '12.3(4)XG') flag++;
else if (version == '12.3(2)XF') flag++;
else if (version == '12.3(14)T7') flag++;
else if (version == '12.3(14)T6') flag++;
else if (version == '12.3(14)T5') flag++;
else if (version == '12.3(14)T3') flag++;
else if (version == '12.3(14)T2') flag++;
else if (version == '12.3(14)T1') flag++;
else if (version == '12.3(14)T') flag++;
else if (version == '12.3(11)T9') flag++;
else if (version == '12.3(11)T8') flag++;
else if (version == '12.3(11)T7') flag++;
else if (version == '12.3(11)T6') flag++;
else if (version == '12.3(11)T5') flag++;
else if (version == '12.3(11)T4') flag++;
else if (version == '12.3(11)T3') flag++;
else if (version == '12.3(11)T2') flag++;
else if (version == '12.3(11)T11') flag++;
else if (version == '12.3(11)T10') flag++;
else if (version == '12.3(11)T') flag++;
else if (version == '12.3(8)T9') flag++;
else if (version == '12.3(8)T8') flag++;
else if (version == '12.3(8)T7') flag++;
else if (version == '12.3(8)T6') flag++;
else if (version == '12.3(8)T5') flag++;
else if (version == '12.3(8)T4') flag++;
else if (version == '12.3(8)T3') flag++;
else if (version == '12.3(8)T11') flag++;
else if (version == '12.3(8)T10') flag++;
else if (version == '12.3(8)T1') flag++;
else if (version == '12.3(8)T') flag++;
else if (version == '12.3(7)T9') flag++;
else if (version == '12.3(7)T8') flag++;
else if (version == '12.3(7)T7') flag++;
else if (version == '12.3(7)T6') flag++;
else if (version == '12.3(7)T4') flag++;
else if (version == '12.3(7)T3') flag++;
else if (version == '12.3(7)T2') flag++;
else if (version == '12.3(7)T12') flag++;
else if (version == '12.3(7)T11') flag++;
else if (version == '12.3(7)T10') flag++;
else if (version == '12.3(7)T1') flag++;
else if (version == '12.3(7)T') flag++;
else if (version == '12.3(11)JX1') flag++;
else if (version == '12.3(11)JX') flag++;
else if (version == '12.3(7)JX9') flag++;
else if (version == '12.3(7)JX8') flag++;
else if (version == '12.3(7)JX7') flag++;
else if (version == '12.3(7)JX6') flag++;
else if (version == '12.3(7)JX5') flag++;
else if (version == '12.3(7)JX4') flag++;
else if (version == '12.3(7)JX3') flag++;
else if (version == '12.3(7)JX2') flag++;
else if (version == '12.3(7)JX11') flag++;
else if (version == '12.3(7)JX10') flag++;
else if (version == '12.3(7)JX1') flag++;
else if (version == '12.3(7)JX') flag++;
else if (version == '12.3(8)JK1') flag++;
else if (version == '12.3(8)JEC2') flag++;
else if (version == '12.3(8)JEC1') flag++;
else if (version == '12.3(8)JEB1') flag++;
else if (version == '12.3(8)JEB') flag++;
else if (version == '12.3(8)JEA3') flag++;
else if (version == '12.3(8)JEA2') flag++;
else if (version == '12.3(8)JEA1') flag++;
else if (version == '12.3(8)JEA') flag++;
else if (version == '12.3(11)JA4') flag++;
else if (version == '12.3(11)JA3') flag++;
else if (version == '12.3(11)JA1') flag++;
else if (version == '12.3(11)JA') flag++;
else if (version == '12.3(8)JA2') flag++;
else if (version == '12.3(8)JA1') flag++;
else if (version == '12.3(8)JA') flag++;
else if (version == '12.3(7)JA5') flag++;
else if (version == '12.3(7)JA4') flag++;
else if (version == '12.3(7)JA3') flag++;
else if (version == '12.3(7)JA2') flag++;
else if (version == '12.3(7)JA1') flag++;
else if (version == '12.3(7)JA') flag++;
else if (version == '12.2(33)XN1') flag++;
else if (version == '12.2(33)SXI') flag++;
else if (version == '12.2(33)STE0') flag++;
else if (version == '12.2(33)SRD') flag++;
else if (version == '12.2(33)SRC3') flag++;
else if (version == '12.2(33)SRC2') flag++;
else if (version == '12.2(33)SRC1') flag++;
else if (version == '12.2(33)SRC') flag++;
else if (version == '12.2(33)SRB5') flag++;
else if (version == '12.2(33)SRB4') flag++;
else if (version == '12.2(33)SRB3') flag++;
else if (version == '12.2(33)SRB2') flag++;
else if (version == '12.2(33)SRB1') flag++;
else if (version == '12.2(33)SRB') flag++;
else if (version == '12.2(44)SQ') flag++;
else if (version == '12.2(50)SG1') flag++;
else if (version == '12.2(50)SG') flag++;
else if (version == '12.2(46)SG1') flag++;
else if (version == '12.2(46)SG') flag++;
else if (version == '12.2(44)SG1') flag++;
else if (version == '12.2(44)SG') flag++;
else if (version == '12.2(46)SE2') flag++;
else if (version == '12.2(46)SE1') flag++;
else if (version == '12.2(46)SE') flag++;
else if (version == '12.2(44)SE5') flag++;
else if (version == '12.2(44)SE4') flag++;
else if (version == '12.2(44)SE3') flag++;
else if (version == '12.2(44)SE2') flag++;
else if (version == '12.2(44)SE1') flag++;
else if (version == '12.2(44)SE') flag++;
else if (version == '12.2(33)SCB') flag++;
else if (version == '12.2(33)SCA2') flag++;
else if (version == '12.2(33)SCA1') flag++;
else if (version == '12.2(33)SCA') flag++;
else if (version == '12.2(33)SB3') flag++;
else if (version == '12.2(33)SB2') flag++;
else if (version == '12.2(33)SB1') flag++;
else if (version == '12.2(33)SB') flag++;
else if (version == '12.2(33)IRB') flag++;
else if (version == '12.2(33)IRA') flag++;
else if (version == '12.2(46)EY') flag++;
else if (version == '12.2(44)EY') flag++;
else if (version == '12.2(46)EX') flag++;
else if (version == '12.2(44)EX1') flag++;
else if (version == '12.2(44)EX') flag++;
if (get_kb_item("Host/local_checks_enabled"))
{
if (flag)
{
flag = 0;
buf = cisco_command_kb_item("Host/Cisco/Config/show_running-config", "show running-config");
if (check_cisco_result(buf))
{
if ( (preg(pattern:"parser view ", multiline:TRUE, string:buf)) && (preg(pattern:"ip scp server enable", multiline:TRUE, string:buf)) ) { flag = 1; }
} else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
}
}
if (flag)
{
security_hole(port:0, extra:cisco_caveat(override));
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "CISCO-SA-20090325-SCPHTTP.NASL", "bulletinFamily": "scanner", "title": "Cisco IOS Software Secure Copy Privilege Escalation Vulnerability - Cisco Systems", "description": "The server side of the Secure Copy (SCP) implementation in Cisco IOS\nsoftware contains a vulnerability that could allow authenticated users\nwith an attached command-line interface (CLI) view to transfer files to\nand from a Cisco IOS device that is configured to be an SCP server,\nregardless of what users are authorized to do, per the CLI view\nconfiguration. This vulnerability could allow valid users to retrieve\nor write to any file on the device's file system, including the\ndevice's saved configuration and Cisco IOS image files, even if the CLI\nview attached to the user does not allow it. This configuration file\nmay include passwords or other sensitive information.\n\nThe Cisco IOS SCP server is an optional service that is disabled by\ndefault. CLI views are a fundamental component of the Cisco IOS\nRole-Based CLI Access feature, which is also disabled by default.\nDevices that are not specifically configured to enable the Cisco IOS\nSCP server, or that are configured to use it but do not use role-based\nCLI access, are not affected by this vulnerability.\n\nThis vulnerability does not apply to the Cisco IOS SCP client feature.\nCisco has released free software updates that address this\nvulnerability.\n\nThere are no workarounds available for this vulnerability apart from\ndisabling either the SCP server or the CLI view feature if these\nservices are not required by administrators.", "published": "2010-09-01T00:00:00", "modified": "2010-09-01T00:00:00", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/49032", "reporter": "This script is (C) 2010-2018 Tenable Network Security, Inc.", "references": ["http://www.nessus.org/u?511a752b", "http://www.nessus.org/u?244201aa"], "cvelist": ["CVE-2009-0637"], "type": "nessus", "lastseen": "2020-09-14T13:24:37", "edition": 13, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-0637"]}, {"type": "cisco", "idList": ["CISCO-SA-20090325-SCP"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:9772", "SECURITYVULNS:DOC:21526"]}, {"type": "openvas", "idList": ["OPENVAS:64169", "OPENVAS:64170"]}], "modified": "2020-09-14T13:24:37", "rev": 2}, "score": {"value": 6.8, "vector": "NONE", "modified": "2020-09-14T13:24:37", "rev": 2}, "vulnersScore": 6.8}, "sourceData": "#TRUSTED 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\n#\n# (C) Tenable Network Security, Inc.\n#\n# Security advisory is (C) CISCO, Inc.\n# See https://www.cisco.com/en/US/products/products_security_advisory09186a0080a96c22.shtml\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(49032);\n script_version(\"1.25\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2018/11/15\");\n\n script_cve_id(\"CVE-2009-0637\");\n script_bugtraq_id(34247);\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCsv38166\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-20090325-scp\");\n\n script_name(english:\"Cisco IOS Software Secure Copy Privilege Escalation Vulnerability - Cisco Systems\");\n script_summary(english:\"Checks IOS version\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote device is missing a vendor-supplied security patch.\");\n script_set_attribute(attribute:\"description\", value:\n\"The server side of the Secure Copy (SCP) implementation in Cisco IOS\nsoftware contains a vulnerability that could allow authenticated users\nwith an attached command-line interface (CLI) view to transfer files to\nand from a Cisco IOS device that is configured to be an SCP server,\nregardless of what users are authorized to do, per the CLI view\nconfiguration. This vulnerability could allow valid users to retrieve\nor write to any file on the device's file system, including the\ndevice's saved configuration and Cisco IOS image files, even if the CLI\nview attached to the user does not allow it. This configuration file\nmay include passwords or other sensitive information.\n\nThe Cisco IOS SCP server is an optional service that is disabled by\ndefault. CLI views are a fundamental component of the Cisco IOS\nRole-Based CLI Access feature, which is also disabled by default.\nDevices that are not specifically configured to enable the Cisco IOS\nSCP server, or that are configured to use it but do not use role-based\nCLI access, are not affected by this vulnerability.\n\nThis vulnerability does not apply to the Cisco IOS SCP client feature.\nCisco has released free software updates that address this\nvulnerability.\n\nThere are no workarounds available for this vulnerability apart from\ndisabling either the SCP server or the CLI view feature if these\nservices are not required by administrators.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?511a752b\");\n # https://www.cisco.com/en/US/products/products_security_advisory09186a0080a96c22.shtml\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?244201aa\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the relevant patch referenced in Cisco Security Advisory\ncisco-sa-20090325-scp.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2009-0637\");\n script_set_attribute(attribute:\"cvss_score_rationale\", value:\"This score is based on Cisco's own advisory (cisco-sa-20090325-scp)\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/03/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/09/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:cisco:ios\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is (C) 2010-2018 Tenable Network Security, Inc.\");\n script_family(english:\"CISCO\");\n\n script_dependencie(\"cisco_ios_version.nasl\");\n script_require_keys(\"Host/Cisco/IOS/Version\");\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"cisco_func.inc\");\ninclude(\"cisco_kb_cmd_func.inc\");\n\nflag = 0;\noverride = 0;\nversion = get_kb_item_or_exit(\"Host/Cisco/IOS/Version\");\n\nif (version == '12.4(20)YA1') flag++;\nelse if (version == '12.4(20)YA') flag++;\nelse if (version == '12.4(15)XZ1') flag++;\nelse if (version == '12.4(15)XZ') flag++;\nelse if (version == '12.4(15)XY5') flag++;\nelse if (version == '12.4(15)XY4') flag++;\nelse if (version == '12.4(15)XY3') flag++;\nelse if (version == '12.4(15)XY2') flag++;\nelse if (version == '12.4(15)XY1') flag++;\nelse if (version == '12.4(15)XY') flag++;\nelse if (version == '12.4(11)XW9') flag++;\nelse if (version == '12.4(11)XW8') flag++;\nelse if (version == '12.4(11)XW7') flag++;\nelse if (version == '12.4(11)XW6') flag++;\nelse if (version == '12.4(11)XW5') flag++;\nelse if (version == '12.4(11)XW4') flag++;\nelse if (version == '12.4(11)XW3') flag++;\nelse if (version == '12.4(11)XW2') flag++;\nelse if (version == '12.4(11)XW1') flag++;\nelse if (version == '12.4(11)XW') flag++;\nelse if (version == '12.4(11)XV1') flag++;\nelse if (version == '12.4(11)XV') flag++;\nelse if (version == '12.4(6)XT2') flag++;\nelse if (version == '12.4(6)XT1') flag++;\nelse if (version == '12.4(6)XT') flag++;\nelse if (version == '12.4(15)XR4') flag++;\nelse if (version == '12.4(15)XR3') flag++;\nelse if (version == '12.4(15)XR2') flag++;\nelse if (version == '12.4(15)XR1') flag++;\nelse if (version == '12.4(15)XR') flag++;\nelse if (version == '12.4(15)XQ1') flag++;\nelse if (version == '12.4(15)XQ') flag++;\nelse if (version == '12.4(6)XP') flag++;\nelse if (version == '12.4(15)XN') flag++;\nelse if (version == '12.4(15)XM2') flag++;\nelse if (version == '12.4(15)XM1') flag++;\nelse if (version == '12.4(15)XM') flag++;\nelse if (version == '12.4(15)XL3') flag++;\nelse if (version == '12.4(15)XL2') flag++;\nelse if (version == '12.4(15)XL1') flag++;\nelse if (version == '12.4(15)XL') flag++;\nelse if (version == '12.4(14)XK') flag++;\nelse if (version == '12.4(11)XJ4') flag++;\nelse if (version == '12.4(11)XJ3') flag++;\nelse if (version == '12.4(11)XJ2') flag++;\nelse if (version == '12.4(11)XJ') flag++;\nelse if (version == '12.4(9)XG3') flag++;\nelse if (version == '12.4(9)XG2') flag++;\nelse if (version == '12.4(9)XG1') flag++;\nelse if (version == '12.4(9)XG') flag++;\nelse if (version == '12.4(15)XF') flag++;\nelse if (version == '12.4(6)XE3') flag++;\nelse if (version == '12.4(6)XE2') flag++;\nelse if (version == '12.4(6)XE1') flag++;\nelse if (version == '12.4(6)XE') flag++;\nelse if (version == '12.4(4)XD9') flag++;\nelse if (version == '12.4(4)XD8') flag++;\nelse if (version == '12.4(4)XD7') flag++;\nelse if (version == '12.4(4)XD5') flag++;\nelse if (version == '12.4(4)XD4') flag++;\nelse if (version == '12.4(4)XD2') flag++;\nelse if (version == '12.4(4)XD11') flag++;\nelse if (version == '12.4(4)XD10') flag++;\nelse if (version == '12.4(4)XD1') flag++;\nelse if (version == '12.4(4)XD') flag++;\nelse if (version == '12.4(4)XC7') flag++;\nelse if (version == '12.4(4)XC6') flag++;\nelse if (version == '12.4(4)XC5') flag++;\nelse if (version == '12.4(4)XC4') flag++;\nelse if (version == '12.4(4)XC3') flag++;\nelse if (version == '12.4(4)XC2') flag++;\nelse if (version == '12.4(4)XC1') flag++;\nelse if (version == '12.4(4)XC') flag++;\nelse if (version == '12.4(2)XB9') flag++;\nelse if (version == '12.4(2)XB8') flag++;\nelse if (version == '12.4(2)XB7') flag++;\nelse if (version == '12.4(2)XB6') flag++;\nelse if (version == '12.4(2)XB5') flag++;\nelse if (version == '12.4(2)XB4') flag++;\nelse if (version == '12.4(2)XB3') flag++;\nelse if (version == '12.4(2)XB2') flag++;\nelse if (version == '12.4(2)XB10') flag++;\nelse if (version == '12.4(2)XB1') flag++;\nelse if (version == '12.4(2)XB') flag++;\nelse if (version == '12.4(2)XA2') flag++;\nelse if (version == '12.4(2)XA1') flag++;\nelse if (version == '12.4(2)XA') flag++;\nelse if (version == '12.4(22)T') flag++;\nelse if (version == '12.4(20)T1') flag++;\nelse if (version == '12.4(20)T') flag++;\nelse if (version == '12.4(15)T8') flag++;\nelse if (version == '12.4(15)T7') flag++;\nelse if (version == '12.4(15)T6') flag++;\nelse if (version == '12.4(15)T5') flag++;\nelse if (version == '12.4(15)T4') flag++;\nelse if (version == '12.4(15)T3') flag++;\nelse if (version == '12.4(15)T2') flag++;\nelse if (version == '12.4(15)T1') flag++;\nelse if (version == '12.4(15)T') flag++;\nelse if (version == '12.4(11)T4') flag++;\nelse if (version == '12.4(11)T3') flag++;\nelse if (version == '12.4(11)T2') flag++;\nelse if (version == '12.4(11)T1') flag++;\nelse if (version == '12.4(11)T') flag++;\nelse if (version == '12.4(9)T7') flag++;\nelse if (version == '12.4(9)T6') flag++;\nelse if (version == '12.4(9)T5') flag++;\nelse if (version == '12.4(9)T4') flag++;\nelse if (version == '12.4(9)T3') flag++;\nelse if (version == '12.4(9)T2') flag++;\nelse if (version == '12.4(9)T1') flag++;\nelse if (version == '12.4(9)T') flag++;\nelse if (version == '12.4(6)T9') flag++;\nelse if (version == '12.4(6)T8') flag++;\nelse if (version == '12.4(6)T7') flag++;\nelse if (version == '12.4(6)T6') flag++;\nelse if (version == '12.4(6)T5') flag++;\nelse if (version == '12.4(6)T4') flag++;\nelse if (version == '12.4(6)T3') flag++;\nelse if (version == '12.4(6)T2') flag++;\nelse if (version == '12.4(6)T11') flag++;\nelse if (version == '12.4(6)T10') flag++;\nelse if (version == '12.4(6)T1') flag++;\nelse if (version == '12.4(6)T') flag++;\nelse if (version == '12.4(4)T8') flag++;\nelse if (version == '12.4(4)T7') flag++;\nelse if (version == '12.4(4)T6') flag++;\nelse if (version == '12.4(4)T5') flag++;\nelse if (version == '12.4(4)T4') flag++;\nelse if (version == '12.4(4)T3') flag++;\nelse if (version == '12.4(4)T2') flag++;\nelse if (version == '12.4(4)T1') flag++;\nelse if (version == '12.4(4)T') flag++;\nelse if (version == '12.4(2)T6') flag++;\nelse if (version == '12.4(2)T5') flag++;\nelse if (version == '12.4(2)T4') flag++;\nelse if (version == '12.4(2)T3') flag++;\nelse if (version == '12.4(2)T2') flag++;\nelse if (version == '12.4(2)T1') flag++;\nelse if (version == '12.4(2)T') flag++;\nelse if (version == '12.4(15)SW2') flag++;\nelse if (version == '12.4(15)SW1') flag++;\nelse if (version == '12.4(15)SW') flag++;\nelse if (version == '12.4(11)SW3') flag++;\nelse if (version == '12.4(11)SW2') flag++;\nelse if (version == '12.4(11)SW1') flag++;\nelse if (version == '12.4(11)SW') flag++;\nelse if (version == '12.4(19)MR1') flag++;\nelse if (version == '12.4(19)MR') flag++;\nelse if (version == '12.4(16)MR2') flag++;\nelse if (version == '12.4(16)MR1') flag++;\nelse if (version == '12.4(16)MR') flag++;\nelse if (version == '12.4(12)MR2') flag++;\nelse if (version == '12.4(12)MR1') flag++;\nelse if (version == '12.4(12)MR') flag++;\nelse if (version == '12.4(11)MR') flag++;\nelse if (version == '12.4(9)MR') flag++;\nelse if (version == '12.4(6)MR1') flag++;\nelse if (version == '12.4(6)MR') flag++;\nelse if (version == '12.4(4)MR1') flag++;\nelse if (version == '12.4(4)MR') flag++;\nelse if (version == '12.4(2)MR1') flag++;\nelse if (version == '12.4(2)MR') flag++;\nelse if (version == '12.4(22)MD') flag++;\nelse if (version == '12.4(15)MD2') flag++;\nelse if (version == '12.4(15)MD1') flag++;\nelse if (version == '12.4(15)MD') flag++;\nelse if (version == '12.4(11)MD6') flag++;\nelse if (version == '12.4(11)MD5') flag++;\nelse if (version == '12.4(11)MD4') flag++;\nelse if (version == '12.4(11)MD3') flag++;\nelse if (version == '12.4(11)MD2') flag++;\nelse if (version == '12.4(11)MD1') flag++;\nelse if (version == '12.4(11)MD') flag++;\nelse if (version == '12.4(10b)JX') flag++;\nelse if (version == '12.4(3g)JX1') flag++;\nelse if (version == '12.4(3g)JX') flag++;\nelse if (version == '12.4(3g)JMC2') flag++;\nelse if (version == '12.4(3g)JMC1') flag++;\nelse if (version == '12.4(3g)JMC') flag++;\nelse if (version == '12.4(3g)JMB') flag++;\nelse if (version == '12.4(3g)JMA1') flag++;\nelse if (version == '12.4(3g)JMA') flag++;\nelse if (version == '12.4(3)JL1') flag++;\nelse if (version == '12.4(3)JL') flag++;\nelse if (version == '12.4(3)JK3') flag++;\nelse if (version == '12.4(3)JK2') flag++;\nelse if (version == '12.4(3)JK1') flag++;\nelse if (version == '12.4(3)JK') flag++;\nelse if (version == '12.4(10b)JDA2') flag++;\nelse if (version == '12.4(10b)JDA1') flag++;\nelse if (version == '12.4(10b)JDA') flag++;\nelse if (version == '12.4(18a)JA1') flag++;\nelse if (version == '12.4(18a)JA') flag++;\nelse if (version == '12.4(16b)JA1') flag++;\nelse if (version == '12.4(16b)JA') flag++;\nelse if (version == '12.4(13d)JA') flag++;\nelse if (version == '12.4(10b)JA4') flag++;\nelse if (version == '12.4(10b)JA3') flag++;\nelse if (version == '12.4(10b)JA2') flag++;\nelse if (version == '12.4(10b)JA1') flag++;\nelse if (version == '12.4(10b)JA') flag++;\nelse if (version == '12.4(3g)JA2') flag++;\nelse if (version == '12.4(3g)JA1') flag++;\nelse if (version == '12.4(3g)JA') flag++;\nelse if (version == '12.4(23)') flag++;\nelse if (version == '12.4(21a)') flag++;\nelse if (version == '12.4(21)') flag++;\nelse if (version == '12.4(19b)') flag++;\nelse if (version == '12.4(19a)') flag++;\nelse if (version == '12.4(19)') flag++;\nelse if (version == '12.4(18c)') flag++;\nelse if (version == '12.4(18b)') flag++;\nelse if (version == '12.4(18a)') flag++;\nelse if (version == '12.4(18)') flag++;\nelse if (version == '12.4(17b)') flag++;\nelse if (version == '12.4(17a)') flag++;\nelse if (version == '12.4(17)') flag++;\nelse if (version == '12.4(16b)') flag++;\nelse if (version == '12.4(16a)') flag++;\nelse if (version == '12.4(16)') flag++;\nelse if (version == '12.4(13f)') flag++;\nelse if (version == '12.4(13e)') flag++;\nelse if (version == '12.4(13d)') flag++;\nelse if (version == '12.4(13c)') flag++;\nelse if (version == '12.4(13b)') flag++;\nelse if (version == '12.4(13a)') flag++;\nelse if (version == '12.4(13)') flag++;\nelse if (version == '12.4(12c)') flag++;\nelse if (version == '12.4(12b)') flag++;\nelse if (version == '12.4(12a)') flag++;\nelse if (version == '12.4(12)') flag++;\nelse if (version == '12.4(10c)') flag++;\nelse if (version == '12.4(10b)') flag++;\nelse if (version == '12.4(10a)') flag++;\nelse if (version == '12.4(10)') flag++;\nelse if (version == '12.4(8d)') flag++;\nelse if (version == '12.4(8c)') flag++;\nelse if (version == '12.4(8b)') flag++;\nelse if (version == '12.4(8a)') flag++;\nelse if (version == '12.4(8)') flag++;\nelse if (version == '12.4(7h)') flag++;\nelse if (version == '12.4(7g)') flag++;\nelse if (version == '12.4(7f)') flag++;\nelse if (version == '12.4(7e)') flag++;\nelse if (version == '12.4(7d)') flag++;\nelse if (version == '12.4(7c)') flag++;\nelse if (version == '12.4(7b)') flag++;\nelse if (version == '12.4(7a)') flag++;\nelse if (version == '12.4(7)') flag++;\nelse if (version == '12.4(5c)') flag++;\nelse if (version == '12.4(5b)') flag++;\nelse if (version == '12.4(5a)') flag++;\nelse if (version == '12.4(5)') flag++;\nelse if (version == '12.4(3j)') flag++;\nelse if (version == '12.4(3i)') flag++;\nelse if (version == '12.4(3h)') flag++;\nelse if (version == '12.4(3g)') flag++;\nelse if (version == '12.4(3f)') flag++;\nelse if (version == '12.4(3e)') flag++;\nelse if (version == '12.4(3d)') flag++;\nelse if (version == '12.4(3c)') flag++;\nelse if (version == '12.4(3b)') flag++;\nelse if (version == '12.4(3a)') flag++;\nelse if (version == '12.4(3)') flag++;\nelse if (version == '12.4(1c)') flag++;\nelse if (version == '12.4(1b)') flag++;\nelse if (version == '12.4(1a)') flag++;\nelse if (version == '12.4(1)') flag++;\nelse if (version == '12.3(8)ZA') flag++;\nelse if (version == '12.3(11)YZ2') flag++;\nelse if (version == '12.3(11)YZ1') flag++;\nelse if (version == '12.3(11)YZ') flag++;\nelse if (version == '12.3(14)YX9') flag++;\nelse if (version == '12.3(14)YX8') flag++;\nelse if (version == '12.3(14)YX7') flag++;\nelse if (version == '12.3(14)YX4') flag++;\nelse if (version == '12.3(14)YX3') flag++;\nelse if (version == '12.3(14)YX2') flag++;\nelse if (version == '12.3(14)YX13') flag++;\nelse if (version == '12.3(14)YX12') flag++;\nelse if (version == '12.3(14)YX11') flag++;\nelse if (version == '12.3(14)YX10') flag++;\nelse if (version == '12.3(14)YX1') flag++;\nelse if (version == '12.3(14)YX') flag++;\nelse if (version == '12.3(14)YU1') flag++;\nelse if (version == '12.3(14)YU') flag++;\nelse if (version == '12.3(14)YT1') flag++;\nelse if (version == '12.3(14)YT') flag++;\nelse if (version == '12.3(11)YS2') flag++;\nelse if (version == '12.3(11)YS1') flag++;\nelse if (version == '12.3(11)YS') flag++;\nelse if (version == '12.3(14)YQ8') flag++;\nelse if (version == '12.3(14)YQ7') flag++;\nelse if (version == '12.3(14)YQ6') flag++;\nelse if (version == '12.3(14)YQ5') flag++;\nelse if (version == '12.3(14)YQ4') flag++;\nelse if (version == '12.3(14)YQ3') flag++;\nelse if (version == '12.3(14)YQ2') flag++;\nelse if (version == '12.3(14)YQ1') flag++;\nelse if (version == '12.3(14)YQ') flag++;\nelse if (version == '12.3(14)YM9') flag++;\nelse if (version == '12.3(14)YM8') flag++;\nelse if (version == '12.3(14)YM7') flag++;\nelse if (version == '12.3(14)YM6') flag++;\nelse if (version == '12.3(14)YM5') flag++;\nelse if (version == '12.3(14)YM4') flag++;\nelse if (version == '12.3(14)YM3') flag++;\nelse if (version == '12.3(14)YM2') flag++;\nelse if (version == '12.3(14)YM12') flag++;\nelse if (version == '12.3(14)YM11') flag++;\nelse if (version == '12.3(14)YM10') flag++;\nelse if (version == '12.3(11)YK3') flag++;\nelse if (version == '12.3(11)YK2') flag++;\nelse if (version == '12.3(11)YK1') flag++;\nelse if (version == '12.3(11)YK') flag++;\nelse if (version == '12.3(11)YJ') flag++;\nelse if (version == '12.3(8)YI3') flag++;\nelse if (version == '12.3(8)YI2') flag++;\nelse if (version == '12.3(8)YI1') flag++;\nelse if (version == '12.3(8)YH') flag++;\nelse if (version == '12.3(8)YG6') flag++;\nelse if (version == '12.3(8)YG5') flag++;\nelse if (version == '12.3(8)YG4') flag++;\nelse if (version == '12.3(8)YG3') flag++;\nelse if (version == '12.3(8)YG2') flag++;\nelse if (version == '12.3(8)YG1') flag++;\nelse if (version == '12.3(8)YG') flag++;\nelse if (version == '12.3(11)YF4') flag++;\nelse if (version == '12.3(11)YF3') flag++;\nelse if (version == '12.3(11)YF2') flag++;\nelse if (version == '12.3(11)YF1') flag++;\nelse if (version == '12.3(11)YF') flag++;\nelse if (version == '12.3(8)YD1') flag++;\nelse if (version == '12.3(8)YD') flag++;\nelse if (version == '12.3(8)YA1') flag++;\nelse if (version == '12.3(8)YA') flag++;\nelse if (version == '12.3(8)XY7') flag++;\nelse if (version == '12.3(8)XY6') flag++;\nelse if (version == '12.3(8)XY5') flag++;\nelse if (version == '12.3(8)XY4') flag++;\nelse if (version == '12.3(8)XY3') flag++;\nelse if (version == '12.3(8)XY2') flag++;\nelse if (version == '12.3(8)XY1') flag++;\nelse if (version == '12.3(8)XY') flag++;\nelse if (version == '12.3(8)XX2d') flag++;\nelse if (version == '12.3(8)XX1') flag++;\nelse if (version == '12.3(8)XX') flag++;\nelse if (version == '12.3(8)XW3') flag++;\nelse if (version == '12.3(8)XW2') flag++;\nelse if (version == '12.3(8)XW1') flag++;\nelse if (version == '12.3(8)XW') flag++;\nelse if (version == '12.3(8)XU5') flag++;\nelse if (version == '12.3(8)XU4') flag++;\nelse if (version == '12.3(8)XU3') flag++;\nelse if (version == '12.3(8)XU2') flag++;\nelse if (version == '12.3(8)XU1') flag++;\nelse if (version == '12.3(8)XU') flag++;\nelse if (version == '12.3(7)XS2') flag++;\nelse if (version == '12.3(7)XS1') flag++;\nelse if (version == '12.3(7)XS') flag++;\nelse if (version == '12.3(7)XR7') flag++;\nelse if (version == '12.3(7)XR6') flag++;\nelse if (version == '12.3(7)XR5') flag++;\nelse if (version == '12.3(7)XR4') flag++;\nelse if (version == '12.3(7)XR3') flag++;\nelse if (version == '12.3(7)XR2') flag++;\nelse if (version == '12.3(7)XR') flag++;\nelse if (version == '12.3(4)XQ1') flag++;\nelse if (version == '12.3(4)XQ') flag++;\nelse if (version == '12.3(11)XL1') flag++;\nelse if (version == '12.3(11)XL') flag++;\nelse if (version == '12.3(4)XK4') flag++;\nelse if (version == '12.3(4)XK3') flag++;\nelse if (version == '12.3(4)XK2') flag++;\nelse if (version == '12.3(4)XK1') flag++;\nelse if (version == '12.3(4)XK') flag++;\nelse if (version == '12.3(7)XJ2') flag++;\nelse if (version == '12.3(7)XJ1') flag++;\nelse if (version == '12.3(7)XJ') flag++;\nelse if (version == '12.3(7)XI9') flag++;\nelse if (version == '12.3(7)XI8d') flag++;\nelse if (version == '12.3(7)XI8c') flag++;\nelse if (version == '12.3(7)XI8a') flag++;\nelse if (version == '12.3(7)XI8') flag++;\nelse if (version == '12.3(7)XI7b') flag++;\nelse if (version == '12.3(7)XI7a') flag++;\nelse if (version == '12.3(7)XI7') flag++;\nelse if (version == '12.3(7)XI6') flag++;\nelse if (version == '12.3(7)XI5') flag++;\nelse if (version == '12.3(7)XI4') flag++;\nelse if (version == '12.3(7)XI3') flag++;\nelse if (version == '12.3(7)XI2a') flag++;\nelse if (version == '12.3(7)XI2') flag++;\nelse if (version == '12.3(7)XI10a') flag++;\nelse if (version == '12.3(7)XI10') flag++;\nelse if (version == '12.3(7)XI1c') flag++;\nelse if (version == '12.3(7)XI1b') flag++;\nelse if (version == '12.3(7)XI1') flag++;\nelse if (version == '12.3(4)XG5') flag++;\nelse if (version == '12.3(4)XG4') flag++;\nelse if (version == '12.3(4)XG3') flag++;\nelse if (version == '12.3(4)XG2') flag++;\nelse if (version == '12.3(4)XG1') flag++;\nelse if (version == '12.3(4)XG') flag++;\nelse if (version == '12.3(2)XF') flag++;\nelse if (version == '12.3(14)T7') flag++;\nelse if (version == '12.3(14)T6') flag++;\nelse if (version == '12.3(14)T5') flag++;\nelse if (version == '12.3(14)T3') flag++;\nelse if (version == '12.3(14)T2') flag++;\nelse if (version == '12.3(14)T1') flag++;\nelse if (version == '12.3(14)T') flag++;\nelse if (version == '12.3(11)T9') flag++;\nelse if (version == '12.3(11)T8') flag++;\nelse if (version == '12.3(11)T7') flag++;\nelse if (version == '12.3(11)T6') flag++;\nelse if (version == '12.3(11)T5') flag++;\nelse if (version == '12.3(11)T4') flag++;\nelse if (version == '12.3(11)T3') flag++;\nelse if (version == '12.3(11)T2') flag++;\nelse if (version == '12.3(11)T11') flag++;\nelse if (version == '12.3(11)T10') flag++;\nelse if (version == '12.3(11)T') flag++;\nelse if (version == '12.3(8)T9') flag++;\nelse if (version == '12.3(8)T8') flag++;\nelse if (version == '12.3(8)T7') flag++;\nelse if (version == '12.3(8)T6') flag++;\nelse if (version == '12.3(8)T5') flag++;\nelse if (version == '12.3(8)T4') flag++;\nelse if (version == '12.3(8)T3') flag++;\nelse if (version == '12.3(8)T11') flag++;\nelse if (version == '12.3(8)T10') flag++;\nelse if (version == '12.3(8)T1') flag++;\nelse if (version == '12.3(8)T') flag++;\nelse if (version == '12.3(7)T9') flag++;\nelse if (version == '12.3(7)T8') flag++;\nelse if (version == '12.3(7)T7') flag++;\nelse if (version == '12.3(7)T6') flag++;\nelse if (version == '12.3(7)T4') flag++;\nelse if (version == '12.3(7)T3') flag++;\nelse if (version == '12.3(7)T2') flag++;\nelse if (version == '12.3(7)T12') flag++;\nelse if (version == '12.3(7)T11') flag++;\nelse if (version == '12.3(7)T10') flag++;\nelse if (version == '12.3(7)T1') flag++;\nelse if (version == '12.3(7)T') flag++;\nelse if (version == '12.3(11)JX1') flag++;\nelse if (version == '12.3(11)JX') flag++;\nelse if (version == '12.3(7)JX9') flag++;\nelse if (version == '12.3(7)JX8') flag++;\nelse if (version == '12.3(7)JX7') flag++;\nelse if (version == '12.3(7)JX6') flag++;\nelse if (version == '12.3(7)JX5') flag++;\nelse if (version == '12.3(7)JX4') flag++;\nelse if (version == '12.3(7)JX3') flag++;\nelse if (version == '12.3(7)JX2') flag++;\nelse if (version == '12.3(7)JX11') flag++;\nelse if (version == '12.3(7)JX10') flag++;\nelse if (version == '12.3(7)JX1') flag++;\nelse if (version == '12.3(7)JX') flag++;\nelse if (version == '12.3(8)JK1') flag++;\nelse if (version == '12.3(8)JEC2') flag++;\nelse if (version == '12.3(8)JEC1') flag++;\nelse if (version == '12.3(8)JEB1') flag++;\nelse if (version == '12.3(8)JEB') flag++;\nelse if (version == '12.3(8)JEA3') flag++;\nelse if (version == '12.3(8)JEA2') flag++;\nelse if (version == '12.3(8)JEA1') flag++;\nelse if (version == '12.3(8)JEA') flag++;\nelse if (version == '12.3(11)JA4') flag++;\nelse if (version == '12.3(11)JA3') flag++;\nelse if (version == '12.3(11)JA1') flag++;\nelse if (version == '12.3(11)JA') flag++;\nelse if (version == '12.3(8)JA2') flag++;\nelse if (version == '12.3(8)JA1') flag++;\nelse if (version == '12.3(8)JA') flag++;\nelse if (version == '12.3(7)JA5') flag++;\nelse if (version == '12.3(7)JA4') flag++;\nelse if (version == '12.3(7)JA3') flag++;\nelse if (version == '12.3(7)JA2') flag++;\nelse if (version == '12.3(7)JA1') flag++;\nelse if (version == '12.3(7)JA') flag++;\nelse if (version == '12.2(33)XN1') flag++;\nelse if (version == '12.2(33)SXI') flag++;\nelse if (version == '12.2(33)STE0') flag++;\nelse if (version == '12.2(33)SRD') flag++;\nelse if (version == '12.2(33)SRC3') flag++;\nelse if (version == '12.2(33)SRC2') flag++;\nelse if (version == '12.2(33)SRC1') flag++;\nelse if (version == '12.2(33)SRC') flag++;\nelse if (version == '12.2(33)SRB5') flag++;\nelse if (version == '12.2(33)SRB4') flag++;\nelse if (version == '12.2(33)SRB3') flag++;\nelse if (version == '12.2(33)SRB2') flag++;\nelse if (version == '12.2(33)SRB1') flag++;\nelse if (version == '12.2(33)SRB') flag++;\nelse if (version == '12.2(44)SQ') flag++;\nelse if (version == '12.2(50)SG1') flag++;\nelse if (version == '12.2(50)SG') flag++;\nelse if (version == '12.2(46)SG1') flag++;\nelse if (version == '12.2(46)SG') flag++;\nelse if (version == '12.2(44)SG1') flag++;\nelse if (version == '12.2(44)SG') flag++;\nelse if (version == '12.2(46)SE2') flag++;\nelse if (version == '12.2(46)SE1') flag++;\nelse if (version == '12.2(46)SE') flag++;\nelse if (version == '12.2(44)SE5') flag++;\nelse if (version == '12.2(44)SE4') flag++;\nelse if (version == '12.2(44)SE3') flag++;\nelse if (version == '12.2(44)SE2') flag++;\nelse if (version == '12.2(44)SE1') flag++;\nelse if (version == '12.2(44)SE') flag++;\nelse if (version == '12.2(33)SCB') flag++;\nelse if (version == '12.2(33)SCA2') flag++;\nelse if (version == '12.2(33)SCA1') flag++;\nelse if (version == '12.2(33)SCA') flag++;\nelse if (version == '12.2(33)SB3') flag++;\nelse if (version == '12.2(33)SB2') flag++;\nelse if (version == '12.2(33)SB1') flag++;\nelse if (version == '12.2(33)SB') flag++;\nelse if (version == '12.2(33)IRB') flag++;\nelse if (version == '12.2(33)IRA') flag++;\nelse if (version == '12.2(46)EY') flag++;\nelse if (version == '12.2(44)EY') flag++;\nelse if (version == '12.2(46)EX') flag++;\nelse if (version == '12.2(44)EX1') flag++;\nelse if (version == '12.2(44)EX') flag++;\n\nif (get_kb_item(\"Host/local_checks_enabled\"))\n{\n if (flag)\n {\n flag = 0;\n buf = cisco_command_kb_item(\"Host/Cisco/Config/show_running-config\", \"show running-config\");\n if (check_cisco_result(buf))\n {\n if ( (preg(pattern:\"parser view \", multiline:TRUE, string:buf)) && (preg(pattern:\"ip scp server enable\", multiline:TRUE, string:buf)) ) { flag = 1; }\n } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }\n }\n}\n\nif (flag)\n{\n security_hole(port:0, extra:cisco_caveat(override));\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "CISCO", "pluginID": "49032", "cpe": ["cpe:/o:cisco:ios"], "scheme": null}
{"cve": [{"lastseen": "2021-02-02T05:39:59", "description": "The SCP server in Cisco IOS 12.2 through 12.4, when Role-Based CLI Access is enabled, does not enforce the CLI view configuration for file transfers, which allows remote authenticated users with an attached CLI view to (1) read or (2) overwrite arbitrary files via an SCP command.", "edition": 4, "cvss3": {}, "published": "2009-03-27T16:30:00", "title": "CVE-2009-0637", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.1, "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-0637"], "modified": "2017-08-29T15:14:00", "cpe": ["cpe:/o:cisco:ios:12.2mb", "cpe:/o:cisco:ios:12.2xg", "cpe:/o:cisco:ios:12.2yv", "cpe:/o:cisco:ios:12.2sxd", "cpe:/o:cisco:ios:12.4xn", "cpe:/o:cisco:ios:12.4jl", "cpe:/o:cisco:ios:12.4\\(3\\)t2", "cpe:/o:cisco:ios:12.2dd", "cpe:/o:cisco:ios:12.2sw", "cpe:/o:cisco:ios:12.4\\(6\\)t", "cpe:/o:cisco:ios:12.2sca", "cpe:/o:cisco:ios:12.2so", "cpe:/o:cisco:ios:12.4\\(2\\)t3", "cpe:/o:cisco:ios:12.2bz", "cpe:/o:cisco:ios:12.2zl", "cpe:/o:cisco:ios:12.2xc", "cpe:/o:cisco:ios:12.2yo", "cpe:/o:cisco:ios:12.2ja", "cpe:/o:cisco:ios:12.2ixf", "cpe:/o:cisco:ios:12.2ey", "cpe:/o:cisco:ios:12.2cz", "cpe:/o:cisco:ios:12.2ye", "cpe:/o:cisco:ios:12.2sxa", "cpe:/o:cisco:ios:12.4\\(8\\)", "cpe:/o:cisco:ios:12.4\\(23\\)", "cpe:/o:cisco:ios:12.2xb", "cpe:/o:cisco:ios:12.2xm", "cpe:/o:cisco:ios:12.2bw", "cpe:/o:cisco:ios:12.2yp", "cpe:/o:cisco:ios:12.2xa", "cpe:/o:cisco:ios:12.2yq", "cpe:/o:cisco:ios:12.2xu", "cpe:/o:cisco:ios:12.4\\(3a\\)", "cpe:/o:cisco:ios:12.4\\(4\\)t", "cpe:/o:cisco:ios:12.2ys", "cpe:/o:cisco:ios:12.2cx", "cpe:/o:cisco:ios:12.2mc", "cpe:/o:cisco:ios_s:12.4", "cpe:/o:cisco:ios:12.4xf", "cpe:/o:cisco:ios:12.4sw", "cpe:/o:cisco:ios:12.2b", "cpe:/o:cisco:ios:12.4xk", "cpe:/o:cisco:ios:12.2xn", "cpe:/o:cisco:ios:12.2yf", "cpe:/o:cisco:ios:12.4\\(6\\)t1", "cpe:/o:cisco:ios:12.2tpc", "cpe:/o:cisco:ios:12.4ja", "cpe:/o:cisco:ios:12.2zc", "cpe:/o:cisco:ios:12.2xk", "cpe:/o:cisco:ios:12.2xo", "cpe:/o:cisco:ios:12.2xq", "cpe:/o:cisco:ios:12.2xd", "cpe:/o:cisco:ios:12.2zg", "cpe:/o:cisco:ios:12.2za", "cpe:/o:cisco:ios:12.4\\(3\\)", "cpe:/o:cisco:ios:12.2xl", "cpe:/o:cisco:ios:12.2yr", "cpe:/o:cisco:ios:12.2sve", "cpe:/o:cisco:ios:12.2ex", "cpe:/o:cisco:ios:12.2sm", "cpe:/o:cisco:ios:12.2bx", "cpe:/o:cisco:ios:12.2ca", "cpe:/o:cisco:ios:12.2sra", "cpe:/o:cisco:ios:12.2ew", "cpe:/o:cisco:ios:12.2svc", "cpe:/o:cisco:ios:12.4\\(4\\)t2", "cpe:/o:cisco:ios:12.2xv", "cpe:/o:cisco:ios:12.2yw", "cpe:/o:cisco:ios:12.4\\(2\\)t4", "cpe:/o:cisco:ios:12.2yy", "cpe:/o:cisco:ios:12.4\\(2\\)xb2", "cpe:/o:cisco:ios:12.2sbc", "cpe:/o:cisco:ios:12.2zya", "cpe:/o:cisco:ios:12.2yn", "cpe:/o:cisco:ios:12.2sb", "cpe:/o:cisco:ios_xr:12.4", "cpe:/o:cisco:ios:12.4", "cpe:/o:cisco:ios:12.4xt", "cpe:/o:cisco:ios:12.2sxf", "cpe:/o:cisco:ios:12.4\\(5b\\)", "cpe:/o:cisco:ios:12.4xl", "cpe:/o:cisco:ios:12.4\\(2\\)xa", "cpe:/o:cisco:ios:12.4jk", "cpe:/o:cisco:ios_t:12.4", "cpe:/o:cisco:ios:12.2ze", "cpe:/o:cisco:ios:12.2su", "cpe:/o:cisco:ios:12.2ixd", "cpe:/o:cisco:ios:12.4\\(7a\\)", "cpe:/o:cisco:ios:12.2zj", "cpe:/o:cisco:ios:12.2zy", "cpe:/o:cisco:ios:12.4jmb", "cpe:/o:cisco:ios:12.2ewa", "cpe:/o:cisco:ios:12.4xb", "cpe:/o:cisco:ios:12.2sx", "cpe:/o:cisco:ios:12.2ixa", "cpe:/o:cisco:ios:12.2cy", "cpe:/o:cisco:ios:12.2ixb", "cpe:/o:cisco:ios:12.4jx", "cpe:/o:cisco:ios:12.2fz", "cpe:/o:cisco:ios:12.2", "cpe:/o:cisco:ios:12.4xj", "cpe:/o:cisco:ios:12.2zx", "cpe:/o:cisco:ios:12.2src", "cpe:/o:cisco:ios:12.2zp", "cpe:/o:cisco:ios:12.2yg", "cpe:/o:cisco:ios:12.2ez", "cpe:/o:cisco:ios:12.4\\(1b\\)", "cpe:/o:cisco:ios:12.2sga", "cpe:/o:cisco:ios:12.2zb", "cpe:/o:cisco:ios:12.4\\(3d\\)", "cpe:/o:cisco:ios:12.2xi", "cpe:/o:cisco:ios:12.2sr", "cpe:/o:cisco:ios:12.2xs", "cpe:/o:cisco:ios:12.4jma", "cpe:/o:cisco:ios:12.4xa", "cpe:/o:cisco:ios:12.2fx", "cpe:/o:cisco:ios:12.2sxb", "cpe:/o:cisco:ios:12.2yc", "cpe:/o:cisco:ios:12.2xf", "cpe:/o:cisco:ios:12.2rc", "cpe:/o:cisco:ios:12.4\\(2\\)t", "cpe:/o:cisco:ios:12.4\\(2\\)mr", "cpe:/o:cisco:ios:12.4\\(2\\)t2", "cpe:/o:cisco:ios:12.2sva", "cpe:/o:cisco:ios:12.4\\(7\\)", "cpe:/o:cisco:ios:12.4jda", "cpe:/o:cisco:ios:12.2irb", "cpe:/o:cisco:ios:12.4\\(1c\\)", "cpe:/o:cisco:ios:12.4mr", "cpe:/o:cisco:ios:12.4xv", "cpe:/o:cisco:ios:12.2ixc", "cpe:/o:cisco:ios:12.2yx", "cpe:/o:cisco:ios:12.4md", "cpe:/o:cisco:ios:12.2l", "cpe:/o:cisco:ios:12.2sy", "cpe:/o:cisco:ios:12.2ixe", "cpe:/o:cisco:ios:12.2yj", "cpe:/o:cisco:ios:12.2yz", "cpe:/o:cisco:ios:12.2ya", "cpe:/o:cisco:ios:12.2bc", "cpe:/o:cisco:ios:12.4xy", "cpe:/o:cisco:ios:12.2xw", "cpe:/o:cisco:ios:12.2xh", "cpe:/o:cisco:ios:12.4\\(4\\)mr", "cpe:/o:cisco:ios:12.4\\(3b\\)", "cpe:/o:cisco:ios:12.2zd", "cpe:/o:cisco:ios:12.4xe", "cpe:/o:cisco:ios:12.2srb", "cpe:/o:cisco:ios:12.2yb", "cpe:/o:cisco:ios:12.4t", "cpe:/o:cisco:ios:12.2xt", "cpe:/o:cisco:ios:12.2by", "cpe:/o:cisco:ios:12.2xr", "cpe:/o:cisco:ios:12.2sz", "cpe:/o:cisco:ios:12.4xw", "cpe:/o:cisco:ios:12.2dx", "cpe:/o:cisco:ios:12.2jk", "cpe:/o:cisco:ios:12.4\\(9\\)t", "cpe:/o:cisco:ios:12.2yt", "cpe:/o:cisco:ios:12.4xp", "cpe:/o:cisco:ios:12.2fy", "cpe:/o:cisco:ios:12.2yk", "cpe:/o:cisco:ios:12.4\\(2\\)mr1", "cpe:/o:cisco:ios:12.4\\(2\\)t1", "cpe:/o:cisco:ios:12.2zu", "cpe:/o:cisco:ios:12.4xd", "cpe:/o:cisco:ios:12.4xg", "cpe:/o:cisco:ios:12.2yu", "cpe:/o:cisco:ios:12.2da", "cpe:/o:cisco:ios:12.2xj", "cpe:/o:cisco:ios:12.4\\(1\\)", "cpe:/o:cisco:ios:12.2yh", "cpe:/o:cisco:ios:12.2s", "cpe:/o:cisco:ios:12.2zf", "cpe:/o:cisco:ios:12.2ixg", "cpe:/o:cisco:ios:12.4\\(5\\)", "cpe:/o:cisco:ios:12.2sv", "cpe:/o:cisco:ios:12.2yd", "cpe:/o:cisco:ios:12.4xm", "cpe:/o:cisco:ios:12.4\\(2\\)xb", "cpe:/o:cisco:ios:12.2yl", "cpe:/o:cisco:ios:12.2t", "cpe:/o:cisco:ios:12.2svd", "cpe:/o:cisco:ios:12.2zh", "cpe:/o:cisco:ios:12.2ym", "cpe:/o:cisco:ios:12.2sxe", "cpe:/o:cisco:ios:12.4xc", "cpe:/o:cisco:ios:12.2xe"], "id": "CVE-2009-0637", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0637", "cvss": {"score": 7.1, "vector": "AV:N/AC:H/Au:S/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ca:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2src:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2svc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2rc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2svd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sga:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sva:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_s:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_t:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(23\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sve:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2l:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2irb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*"]}], "securityvulns": [{"lastseen": "2018-08-31T11:10:29", "bulletinFamily": "software", "cvelist": ["CVE-2009-0637"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nCisco Security Advisory: Cisco IOS Software Secure Copy Privilege\r\nEscalation Vulnerability\r\n\r\nAdvisory ID: cisco-sa-20090325-scp\r\n\r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml\r\n\r\nRevision 1.0\r\n\r\nFor Public Release 2009 March 25 1600 UTC (GMT)\r\n\r\n- ---------------------------------------------------------------------\r\n\r\nSummary\r\n=======\r\n\r\nThe server side of the Secure Copy (SCP) implementation in Cisco IOS\r\nsoftware contains a vulnerability that could allow authenticated\r\nusers with an attached command-line interface (CLI) view to transfer\r\nfiles to and from a Cisco IOS device that is configured to be an SCP\r\nserver, regardless of what users are authorized to do, per the CLI\r\nview configuration. This vulnerability could allow valid users to\r\nretrieve or write to any file on the device's file system, including\r\nthe device's saved configuration and Cisco IOS image files, even if\r\nthe CLI view attached to the user does not allow it. This\r\nconfiguration file may include passwords or other sensitive\r\ninformation.\r\n\r\nThe Cisco IOS SCP server is an optional service that is disabled by\r\ndefault. CLI views are a fundamental component of the Cisco IOS\r\nRole-Based CLI Access feature, which is also disabled by default.\r\nDevices that are not specifically configured to enable the Cisco IOS\r\nSCP server, or that are configured to use it but do not use\r\nrole-based CLI access, are not affected by this vulnerability.\r\n\r\nThis vulnerability does not apply to the Cisco IOS SCP client\r\nfeature.\r\n\r\nCisco has released free software updates that address this\r\nvulnerability.\r\n\r\nThere are no workarounds available for this vulnerability apart from\r\ndisabling either the SCP server or the CLI view feature if these\r\nservices are not required by administrators.\r\n\r\nThis advisory is posted at the following link: \r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml\r\n\r\nNote: The March 25, 2009, Cisco IOS Security Advisory bundled\r\npublication includes eight Security Advisories. All of the advisories\r\naddress vulnerabilities in Cisco IOS Software. Each advisory lists\r\nthe releases that correct the vulnerability or vulnerabilities in the\r\nadvisory. The following table lists releases that correct all Cisco\r\nIOS Software vulnerabilities that have been published in Cisco\r\nSecurity Advisories on March 25, 2009, or earlier.\r\n\r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20090325-bundle.shtml\r\n\r\nIndividual publication links are listed below:\r\n\r\n * Cisco IOS cTCP Denial of Service Vulnerability\r\n http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml\r\n\r\n * Cisco IOS Software Multiple Features IP Sockets Vulnerability\r\n http://www.cisco.com/warp/public/707/cisco-sa-20090325-ip.shtml\r\n\r\n * Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities\r\n http://www.cisco.com/warp/public/707/cisco-sa-20090325-mobileip.shtml\r\n\r\n * Cisco IOS Software Secure Copy Privilege Escalation Vulnerability\r\n http://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml\r\n\r\n * Cisco IOS Software Session Initiation Protocol Denial of Service\r\n Vulnerability\r\n http://www.cisco.com/warp/public/707/cisco-sa-20090325-sip.shtml\r\n\r\n * Cisco IOS Software Multiple Features Crafted TCP Sequence\r\n Vulnerability\r\n http://www.cisco.com/warp/public/707/cisco-sa-20090325-tcp.shtml\r\n\r\n * Cisco IOS Software Multiple Features Crafted UDP Packet\r\n Vulnerability\r\n http://www.cisco.com/warp/public/707/cisco-sa-20090325-udp.shtml\r\n\r\n * Cisco IOS Software WebVPN and SSLVPN Vulnerabilities\r\n http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml\r\n\r\nAffected Products\r\n=================\r\n\r\nVulnerable Products\r\n+------------------\r\n\r\nCisco devices running an affected Cisco IOS software release,\r\nconfigured to offer SCP server functionality, and configured to use\r\nrole-based ACL access are affected by this issue.\r\n\r\nA device running a vulnerable Cisco IOS software release is affected\r\nif its configuration is similar to the following:\r\n\r\n parser view <view name>\r\n <Definition of the CLI view>\r\n !\r\n username <user ID> view <view name> secret <some secret>\r\n !\r\n ip scp server enable\r\n\r\nIn the above configuration snippet, the parser view command defines a\r\nview that specifies what commands users in that view can execute. The\r\nusername command defines a local user and attaches, via the view\r\nkeyword, the previously defined view to the user. And finally, the ip\r\nscp server enable command enables the Cisco IOS SCP server.\r\n\r\nThe absence of the username command does not guarantee that the\r\ndevice's configuration is not affected by this vulnerability because\r\nthe name of a CLI view can be supplied by means of an Authentication,\r\nAuthorization, and Accounting (AAA) server by using the cli-view-name\r\nattribute.\r\n\r\nNote: The CLI view attached to a user can be supplied by a AAA\r\nserver. When inspecting a device's configuration to determine if it\r\nis affected by this vulnerability it is better to check if the SCP\r\nservice is enabled (ip scp server enabled command) and whether there\r\nare any CLI views defined (parser view command).\r\n\r\nThe Cisco IOS SCP server and role-based CLI access features are\r\ndisabled by default.\r\n\r\nThe SCP server functionality is only available on encryption-capable\r\nimages. Encryption-capable images are those that contain either a\r\n"k8" or "k9" in the image name, for example, "C7200-ADVSECURITYK9-M".\r\nDevices that do not run encryption-capable images are not vulnerable.\r\nIf a device is running an encryption-capable image, the presence in\r\nthe configuration of the ip scp server enable command, the existence\r\nof CLI views (parser view command), and whether there are users\r\n(local or remote) attached to these views will determine if the\r\ndevice is affected.\r\n\r\nTo determine the Cisco IOS Software release that is running on a\r\nCisco product, administrators can log in to the device and issue the\r\nshow version command to display the system banner. The system banner\r\nconfirms that the device is running Cisco IOS Software by displaying\r\ntext similar to "Cisco Internetwork Operating System Software" or\r\n"Cisco IOS Software." The image name displays in parentheses,\r\nfollowed by "Version" and the Cisco IOS Software release name. Other\r\nCisco devices do not have the show version command or may provide\r\ndifferent output.\r\n\r\nThe following example identifies a Cisco product that is running\r\nCisco IOS Software Release 12.3(26) with an installed image name of\r\nC2500-IS-L:\r\n\r\n Router#show version\r\n Cisco Internetwork Operating System Software\r\n IOS (tm) 2500 Software (C2500-IS-L), Version 12.3(26), RELEASE SOFTWARE (fc2)\r\n Technical Support: http://www.cisco.com/techsupport\r\n Copyright (c) 1986-2008 by cisco Systems, Inc.\r\n Compiled Mon 17-Mar-08 14:39 by dchih\r\n\r\n !--- output truncated\r\n\r\n\r\nThe following example identifies a Cisco product that is running\r\nCisco IOS Software Release 12.4(20)T with an installed image name of\r\nC1841-ADVENTERPRISEK9-M:\r\n\r\n Router#show version\r\n Cisco IOS Software, 1841 Software (C1841-ADVENTERPRISEK9-M), Version 12.4(20)T, RELEASE SOFTWARE (fc3)\r\n Technical Support: http://www.cisco.com/techsupport\r\n Copyright (c) 1986-2008 by Cisco Systems, Inc.\r\n Compiled Thu 10-Jul-08 20:25 by prod_rel_team\r\n\r\n !--- output truncated\r\n\r\n\r\nAdditional information about Cisco IOS Software release naming\r\nconventions is available in "White Paper: Cisco IOS Reference Guide"\r\nat the following link: http://www.cisco.com/warp/public/620/1.html\r\n\r\nCisco IOS XE Software is also affected by this vulnerability.\r\n\r\nProducts Confirmed Not Vulnerable\r\n+--------------------------------\r\n\r\nCisco devices that do not run Cisco IOS software are not affected.\r\n\r\nCisco IOS devices that do not have the SCP server feature enabled, or\r\nthat make use of the feature but do not have the role-based CLI\r\nfeature enabled, are not affected.\r\n\r\nCisco IOS XR Software is not affected.\r\n\r\nNo other Cisco products are currently known to be affected by this\r\nvulnerability.\r\n\r\nDetails\r\n=======\r\n\r\nSCP is a protocol similar to the Remote Copy (RCP) protocol, which\r\nallows the transfer of files between systems. The main difference\r\nbetween SCP and RCP is that in SCP, all aspects of the file transfer\r\nsession, including authentication, occur in encrypted form, which\r\nmakes SCP a more secure alternative than RCP. SCP relies on the\r\nSecure Shell (SSH) protocol, which uses TCP port 22 by default.\r\n\r\nThe Role-Based CLI Access feature allows the network administrator to\r\ndefine "views". Views are sets of operational commands and\r\nconfiguration capabilities that provide selective or partial access\r\nto Cisco IOS software EXEC and configuration (Config) mode commands.\r\nViews restrict user access to Cisco IOS command-line interface (CLI)\r\nand configuration information; that is, a view can define what\r\ncommands are accepted and what configuration information is visible.\r\nFor more information about the Role-Based CLI Access feature,\r\nreference \r\nhttp://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gtclivws.html\r\n\r\nThe server side of the SCP implementation in Cisco IOS software\r\ncontains a vulnerability that allows authenticated users with an\r\nattached command-line interface (CLI) view to transfer files to and\r\nfrom a Cisco IOS device that is configured to be a SCP server,\r\nregardless of what users are authorized to do, per the CLI view\r\nconfiguration. This vulnerability could allow authenticated users to\r\nretrieve or write to any file on the device's file system, including\r\nthe device's saved configuration and Cisco IOS image files. This\r\nconfiguration file may include passwords or other sensitive\r\ninformation.\r\n\r\nIn the affected configuration presented in the Affected Products\r\nsection, users confined to a CLI view can elevate their privileges by\r\nusing SCP to write to the device's configuration. Note that a view\r\ncan be attached to a user when defining the user in the local\r\ndatabase (via the username <user name> view ... command), or by\r\npassing the attribute cli-view-name from an AAA server.\r\n\r\nThis vulnerability does not allow for authentication bypass; login\r\ncredentials are verified and access is only granted if a valid\r\nusername and password is provided. This vulnerability may cause\r\nauthorization to be bypassed.\r\n\r\nThis vulnerability is documented in the Cisco Bug ID CSCsv38166 \r\nand has been assigned Common Vulnerabilities and Exposures (CVE) ID\r\nCVE-2009-0637.\r\n\r\nVulnerability Scoring Details\r\n==============================\r\n\r\nCisco has provided scores for the vulnerabilities in this advisory\r\nbased on the Common Vulnerability Scoring System (CVSS). The CVSS\r\nscoring in this Security Advisory is done in accordance with CVSS\r\nversion 2.0.\r\n\r\nCVSS is a standards-based scoring method that conveys vulnerability\r\nseverity and helps determine urgency and priority of response.\r\n\r\nCisco has provided a base and temporal score. Customers can then\r\ncompute environmental scores to assist in determining the impact of\r\nthe vulnerability in individual networks.\r\n\r\nCisco has provided an FAQ to answer additional questions regarding\r\nCVSS at\r\n\r\nhttp://www.cisco.com/web/about/security/intelligence/cvss-qandas.html\r\n\r\nCisco has also provided a CVSS calculator to help compute the\r\nenvironmental impact for individual networks at\r\n\r\nhttp://intellishield.cisco.com/security/alertmanager/cvss\r\n\r\nCSCsv38166 - SCP + views (role-based CLI) allows privilege escalation\r\n\r\nCVSS Base Score - 9.0\r\n\r\n Access Vector - Network\r\n Access Complexity - Low\r\n Authentication - Single\r\n Confidentiality Impact - Complete\r\n Integrity Impact - Complete\r\n Availability Impact - Complete\r\n\r\nCVSS Temporal Score - 7.4\r\n\r\n Exploitability - Functional\r\n Remediation Level - Official-Fix\r\n Report Confidence - Confirmed\r\n\r\nImpact\r\n======\r\n\r\nSuccessful exploitation of the vulnerability described in this\r\nadvisory may allow valid but unauthorized users to retrieve or write\r\nto any file on the device's file system, including the device's saved\r\nconfiguration and Cisco IOS image files. This configuration file may\r\ninclude passwords or other sensitive information.\r\n\r\nSoftware Versions and Fixes\r\n===========================\r\n\r\nWhen considering software upgrades, also consult \r\nhttp://www.cisco.com/go/psirt and any subsequent advisories to \r\ndetermine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should exercise caution to be certain the\r\ndevices to be upgraded contain sufficient memory and that current\r\nhardware and software configurations will continue to be supported\r\nproperly by the new release. If the information is not clear, contact\r\nthe Cisco Technical Assistance Center (TAC) or your contracted\r\nmaintenance provider for assistance.\r\n\r\nEach row of the Cisco IOS software table (below) names a Cisco IOS\r\nrelease train. If a given release train is vulnerable, then the\r\nearliest possible releases that contain the fix (along with the\r\nanticipated date of availability for each, if applicable) are listed\r\nin the "First Fixed Release" column of the table. The "Recommended\r\nRelease" column indicates the releases which have fixes for all the\r\npublished vulnerabilities at the time of this Advisory. A device\r\nrunning a release in the given train that is earlier than the release\r\nin a specific column (less than the First Fixed Release) is known to\r\nbe vulnerable. Cisco recommends upgrading to a release equal to or\r\nlater than the release in the "Recommended Releases" column of the\r\ntable.\r\n\r\n+-------------------------------------------------------------------+\r\n| Major | Availability of Repaired Releases |\r\n| Release | |\r\n|------------+------------------------------------------------------|\r\n| Affected | | Recommended |\r\n| 12.0-Based | First Fixed Release | Release |\r\n| Releases | | |\r\n|-------------------------------------------------------------------|\r\n| There are no affected 12.0 based releases |\r\n|-------------------------------------------------------------------|\r\n| Affected | | Recommended |\r\n| 12.1-Based | First Fixed Release | Release |\r\n| Releases | | |\r\n|-------------------------------------------------------------------|\r\n| There are no affected 12.1 based releases |\r\n|-------------------------------------------------------------------|\r\n| Affected | | Recommended |\r\n| 12.2-Based | First Fixed Release | Release |\r\n| Releases | | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2 | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2B | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2BC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2BW | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2BX | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2BY | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2BZ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2CX | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2CY | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2CZ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2DA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2DD | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2DX | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2EW | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2EWA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2EX | Vulnerable; migrate to any release | 12.2(44)SE6 |\r\n| | in 12.2SEG | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2EY | Vulnerable; first fixed in 12.2SE | 12.2(44)SE6 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2EZ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2FX | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2FY | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2FZ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.2(33)SRC4; |\r\n| 12.2IRA | Vulnerable; first fixed in 12.2SRC | Available on |\r\n| | | 18-MAY-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.2(33)SRC4; |\r\n| 12.2IRB | Vulnerable; first fixed in 12.2SRC | Available on |\r\n| | | 18-MAY-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2IXA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2IXB | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2IXC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2IXD | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2IXE | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2IXF | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2IXG | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2JA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2JK | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2MB | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2MC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2S | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SB | 12.2(33)SB4 | 12.2(33)SB4 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SBC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SCA | Vulnerable; first fixed in 12.2SCB | 12.2(33)SCB1 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SCB | 12.2(33)SCB1 | 12.2(33)SCB1 |\r\n|------------+------------------------------------+-----------------|\r\n| | 12.2(50)SE | |\r\n| 12.2SE | | 12.2(44)SE6 |\r\n| | 12.2(44)SE6 | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SEA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SEB | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SEC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SED | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SEE | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SEF | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SEG | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| | 12.2(52)SG; Available on | 12.2(52)SG; |\r\n| 12.2SG | 15-MAY-2009 | Available on |\r\n| | | 15-MAY-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SGA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SL | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SM | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SO | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SQ | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SRA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.2(33)SRC4; |\r\n| | | Available on |\r\n| | | 18-MAY-2009 |\r\n| 12.2SRB | Vulnerable; first fixed in 12.2SRC | |\r\n| | | 12.2(33)SRB5a; |\r\n| | | Available on |\r\n| | | 3-April-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | 12.2(33)SRC4; Available on | 12.2(33)SRC4; |\r\n| 12.2SRC | 18-MAY-2009 | Available on |\r\n| | | 18-MAY-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SRD | 12.2(33)SRD1 | 12.2(33)SRD1 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2STE | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SU | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SV | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SVA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SVC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SVD | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SVE | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SW | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SX | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SXA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SXB | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SXD | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SXE | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SXF | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SXH | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SXI | 12.2(33)SXI1 | 12.2(33)SXI1 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SY | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2SZ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2T | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2TPC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XB | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XD | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XE | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XF | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XG | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XH | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XI | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XJ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XK | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XL | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XM | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.2(33)SB4 |\r\n| | | |\r\n| | | 12.2(33)SRD1 |\r\n| 12.2XN | Vulnerable; first fixed in 12.2SRC | |\r\n| | | 12.2(33)SRC4; |\r\n| | | Available on |\r\n| | | 18-MAY-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.2(33)SRD1 |\r\n| | | |\r\n| 12.2XNA | Vulnerable; first fixed in 12.2SRD | 12.2(33)SRC4; |\r\n| | | Available on |\r\n| | | 18-MAY-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XNB | 12.2(33)XNB3 | 12.2(33)XNB3 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XNC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XO | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XQ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XR | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XS | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XT | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XU | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XV | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2XW | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YB | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YD | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YE | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YF | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YG | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YH | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YJ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YK | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YL | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YM | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YN | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YO | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YP | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YQ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YR | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YS | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YT | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YU | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YV | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YW | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YX | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YY | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2YZ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZB | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZD | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZE | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZF | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZG | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZH | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZJ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZL | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZP | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZU | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZX | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZY | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.2ZYA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| Affected | | Recommended |\r\n| 12.3-Based | First Fixed Release | Release |\r\n| Releases | | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3 | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3B | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3BC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3BW | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3EU | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3JA | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3JEA | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3JEB | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3JEC | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3JK | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3JL | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3JX | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3T | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3TPC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3VA | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XA | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XB | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XC | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XD | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XE | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XF | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3XG | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XI | Vulnerable; first fixed in 12.2SB | 12.2(33)SB4 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XJ | Vulnerable; first fixed in 12.3YX | 12.3(14)YX14 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3XK | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3XL | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3XQ | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(18e) |\r\n| | | |\r\n| 12.3XR | Vulnerable; first fixed in 12.4 | 12.4(23a); |\r\n| | | Available on |\r\n| | | 30-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3XS | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3XU | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XW | Vulnerable; first fixed in 12.3YX | 12.3(14)YX14 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3XX | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3XY | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3XZ | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YA | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YD | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3YF | Vulnerable; first fixed in 12.3YX | 12.3(14)YX14 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YG | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YH | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YI | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YJ | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YK | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3YM | 12.3(14)YM13 | 12.3(14)YM13 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YQ | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YS | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YT | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3YU | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3YX | 12.3(14)YX14 | 12.3(14)YX14 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.3YZ | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.3ZA | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| Affected | | Recommended |\r\n| 12.4-Based | First Fixed Release | Release |\r\n| Releases | | |\r\n|------------+------------------------------------+-----------------|\r\n| | 12.4(18e) | 12.4(18e) |\r\n| | | |\r\n| 12.4 | 12.4(23a); Available on | 12.4(23a); |\r\n| | 30-APR-2009 | Available on |\r\n| | | 30-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4JA | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4JDA | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4JK | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4JL | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4JMA | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4JMB | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4JX | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4MD | 12.4(11)MD7 | 12.4(11)MD7 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4MR | 12.4(19)MR2 | 12.4(19)MR2 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4SW | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| | 12.4(24)T | |\r\n| | | 12.4(22)T1 |\r\n| | 12.4(20)T2 | |\r\n| 12.4T | | 12.4(15)T9; |\r\n| | 12.4(22)T1 | Available on |\r\n| | | 29-APR-2009 |\r\n| | 12.4(15)T9; Available on | |\r\n| | 29-APR-2009 | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XA | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XB | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XC | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | 12.4(4)XD12; Available on | 12.4(4)XD12; |\r\n| 12.4XD | 27-MAR-2009 | Available on |\r\n| | | 27-MAR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XE | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XF | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | 12.4(20)T2 | |\r\n| 12.4XG | | 12.4(15)T9; |\r\n| | 12.4(22)T1 | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XJ | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XK | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | Releases prior to 12.4(15)XL4 are | |\r\n| 12.4XL | vulnerable, release 12.4(15)XL4 | 12.4(15)XL4 |\r\n| | and later are not vulnerable; | |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XM | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4XN | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4XP | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4XQ | 12.4(15)XQ2 | 12.4(15)XQ2 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XR | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XT | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4XV | Vulnerable; contact TAC | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4XW | 12.4(11)XW10 | 12.4(11)XW10 |\r\n|------------+------------------------------------+-----------------|\r\n| | | 12.4(22)T1 |\r\n| | | |\r\n| 12.4XY | Vulnerable; first fixed in 12.4T | 12.4(15)T9; |\r\n| | | Available on |\r\n| | | 29-APR-2009 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4XZ | 12.4(15)XZ2 | 12.4(15)XZ2 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4YA | 12.4(20)YA2 | 12.4(20)YA3 |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4YB | Not Vulnerable | |\r\n|------------+------------------------------------+-----------------|\r\n| 12.4YD | Not Vulnerable | |\r\n+-------------------------------------------------------------------+\r\n\r\nWorkarounds\r\n===========\r\n\r\nIf the Cisco IOS SCP server functionality is not needed then the\r\nvulnerability described in this document can be mitigated by\r\ndisabling the SCP server or the CLI view feature. The SCP server can\r\nbe disabled by executing the following command in global\r\nconfiguration mode:\r\n\r\n no ip scp server enable\r\n\r\nIf the SCP server cannot be disabled due to operational concerns,\r\nthen no workarounds exist. The risk posed by this vulnerability can\r\nbe mitigated by following the best practices detailed in "Cisco Guide\r\nto Harden Cisco IOS Devices" at \r\nhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml\r\nPlease refer to the Obtaining Fixed Software section of this advisory\r\nfor appropriate solutions to resolve this vulnerability.\r\n\r\nDue to the nature of this vulnerability, networking best practices\r\nlike access control lists (ACLs) and Control Plane Policing (CoPP)\r\nthat restrict access to a device to certain IP addresses or\r\nsubnetworks may not be effective. If access is already granted to a\r\nspecific IP address or subnetwork, a user with low privileges will be\r\nable to establish an SCP session with the device, which would allow\r\nthe user to exploit this vulnerability.\r\n\r\nObtaining Fixed Software\r\n========================\r\n\r\nCisco has released free software updates that address these\r\nvulnerabilities. Prior to deploying software, customers should\r\nconsult their maintenance provider or check the software for feature\r\nset compatibility and known issues specific to their environment.\r\n\r\nCustomers may only install and expect support for the feature sets\r\nthey have purchased. By installing, downloading, accessing or\r\notherwise using such software upgrades, customers agree to be bound\r\nby the terms of Cisco's software license terms found at \r\nhttp://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html, or as\r\notherwise set forth at Cisco.com Downloads at \r\nhttp://www.cisco.com/public/sw-center/sw-usingswc.shtml\r\n\r\nDo not contact psirt@cisco.com or security-alert@cisco.com for\r\nsoftware upgrades.\r\n\r\nCustomers with Service Contracts\r\n+-------------------------------\r\n\r\nCustomers with contracts should obtain upgraded software through\r\ntheir regular update channels. For most customers, this means that\r\nupgrades should be obtained through the Software Center on Cisco's\r\nworldwide website at http://www.cisco.com\r\n\r\nCustomers using Third Party Support Organizations\r\n+------------------------------------------------\r\n\r\nCustomers whose Cisco products are provided or maintained through\r\nprior or existing agreements with third-party support organizations,\r\nsuch as Cisco Partners, authorized resellers, or service providers\r\nshould contact that support organization for guidance and assistance\r\nwith the appropriate course of action in regards to this advisory.\r\n\r\nThe effectiveness of any workaround or fix is dependent on specific\r\ncustomer situations, such as product mix, network topology, traffic\r\nbehavior, and organizational mission. Due to the variety of affected\r\nproducts and releases, customers should consult with their service\r\nprovider or support organization to ensure any applied workaround or\r\nfix is the most appropriate for use in the intended network before it\r\nis deployed.\r\n\r\nCustomers without Service Contracts\r\n+----------------------------------\r\n\r\nCustomers who purchase direct from Cisco but do not hold a Cisco\r\nservice contract, and customers who purchase through third-party\r\nvendors but are unsuccessful in obtaining fixed software through\r\ntheir point of sale should acquire upgrades by contacting the Cisco\r\nTechnical Assistance Center (TAC). TAC contacts are as follows.\r\n\r\n * +1 800 553 2447 (toll free from within North America)\r\n * +1 408 526 7209 (toll call from anywhere in the world)\r\n * e-mail: tac@cisco.com\r\n\r\nCustomers should have their product serial number available and be\r\nprepared to give the URL of this notice as evidence of entitlement to\r\na free upgrade. Free upgrades for non-contract customers must be\r\nrequested through the TAC.\r\n\r\nRefer to http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html\r\nfor additional TAC contact information, including localized telephone \r\nnumbers, and instructions and e-mail addresses for use in various \r\nlanguages.\r\n\r\nExploitation and Public Announcements\r\n=====================================\r\n\r\nThe Cisco PSIRT is not aware of any public announcements or malicious\r\nuse of the vulnerability described in this advisory.\r\n\r\nThis vulnerability was reported to Cisco by Kevin Graham. Cisco would\r\nlike to thank Mr. Graham for reporting this vulnerability and working\r\nwith us towards coordinated disclosure of the vulnerability.\r\n\r\nStatus of this Notice: FINAL\r\n============================\r\n\r\nTHIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY\r\nKIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF\r\nMERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE\r\nINFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS\r\nAT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS\r\nDOCUMENT AT ANY TIME.\r\n\r\nA stand-alone copy or Paraphrase of the text of this document that\r\nomits the distribution URL in the following section is an\r\nuncontrolled copy, and may lack important information or contain\r\nfactual errors.\r\n\r\nDistribution\r\n============\r\n\r\nThis advisory is posted on Cisco's worldwide website at :\r\n\r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml\r\n\r\nIn addition to worldwide web posting, a text version of this notice\r\nis clear-signed with the Cisco PSIRT PGP key and is posted to the\r\nfollowing e-mail and Usenet news recipients.\r\n\r\n * cust-security-announce@cisco.com\r\n * first-bulletins@lists.first.org\r\n * bugtraq@securityfocus.com\r\n * vulnwatch@vulnwatch.org\r\n * cisco@spot.colorado.edu\r\n * cisco-nsp@puck.nether.net\r\n * full-disclosure@lists.grok.org.uk\r\n * comp.dcom.sys.cisco@newsgate.cisco.com\r\n\r\nFuture updates of this advisory, if any, will be placed on Cisco's\r\nworldwide website, but may or may not be actively announced on\r\nmailing lists or newsgroups. Users concerned about this problem are\r\nencouraged to check the above URL for any updates.\r\n\r\nRevision History\r\n================\r\n\r\n+---------------------------------------+\r\n| Revision | | Initial |\r\n| 1.0 | 2009-March-25 | public |\r\n| | | release |\r\n+---------------------------------------+\r\n\r\nCisco Security Procedures\r\n=========================\r\n\r\nComplete information on reporting security vulnerabilities in Cisco\r\nproducts, obtaining assistance with security incidents, and\r\nregistering to receive security information from Cisco, is available\r\non Cisco's worldwide website at \r\nhttp://www.cisco.com/en/US/products/products_security_vulnerability_policy.html\r\nThis includes instructions for press inquiries regarding Cisco \r\nsecurity notices. All Cisco security advisories are available at \r\nhttp://www.cisco.com/go/psirt\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.8 (Darwin)\r\n\r\niEYEARECAAYFAknKUbQACgkQ86n/Gc8U/uBoggCdGbEAh9pGrV/ApbhENou5MF4M\r\nvTIAn03h9J//T0V6BZBxwwS2hKs/JIXi\r\n=JGEE\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2009-03-26T00:00:00", "published": "2009-03-26T00:00:00", "id": "SECURITYVULNS:DOC:21526", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:21526", "title": "Cisco Security Advisory: Cisco IOS Software Secure Copy Privilege Escalation Vulnerability", "type": "securityvulns", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:32", "bulletinFamily": "software", "cvelist": ["CVE-2009-0626", "CVE-2009-0637", "CVE-2009-0629", "CVE-2009-0628", "CVE-2009-0635", "CVE-2009-0633", "CVE-2009-0634"], "description": "Multiple DoS conditions in TCP, cTCP, Mobile IP/Mobile IPv6, WebVPN, SSLVPN implementations, SCP privilege escalation.", "edition": 1, "modified": "2009-04-01T00:00:00", "published": "2009-04-01T00:00:00", "id": "SECURITYVULNS:VULN:9772", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9772", "title": "Cisco IOS multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:COMPLETE/"}}], "cisco": [{"lastseen": "2020-12-24T11:42:07", "bulletinFamily": "software", "cvelist": ["CVE-2009-0637"], "description": "", "modified": "2009-03-25T16:00:00", "published": "2009-03-25T16:00:00", "id": "CISCO-SA-20090325-SCP", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20090325-scp", "type": "cisco", "title": "Cisco IOS Software Secure Copy Privilege Escalation Vulnerability", "cvss": {"score": 7.1, "vector": "AV:N/AC:H/Au:S/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2017-12-04T11:29:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1095", "CVE-2009-1093", "CVE-2009-0733", "CVE-2009-1096", "CVE-2008-5239", "CVE-2009-0921", "CVE-2009-1097", "CVE-2009-0928", "CVE-2009-0207", "CVE-2009-0626", "CVE-2009-0723", "CVE-2008-4316", "CVE-2009-0637", "CVE-2009-0629", "CVE-2009-0628", "CVE-2009-0784", "CVE-2009-1100", "CVE-2009-0635", "CVE-2009-0927", "CVE-2009-1098", "CVE-2009-0698", "CVE-2009-1094", "CVE-2006-2426", "CVE-2009-0193", "CVE-2009-0920", "CVE-2008-1036", "CVE-2009-1101", "CVE-2009-1102", "CVE-2009-0633", "CVE-2009-0581", "CVE-2009-0634"], "description": "The remote host is missing an update to lcms\nannounced via advisory USN-744-1.", "modified": "2017-12-01T00:00:00", "published": "2009-06-05T00:00:00", "id": "OPENVAS:64170", "href": "http://plugins.openvas.org/nasl.php?oid=64170", "type": "openvas", "title": "Ubuntu USN-744-1 (lcms)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: ubuntu_744_1.nasl 7969 2017-12-01 09:23:16Z santu $\n# $Id: ubuntu_744_1.nasl 7969 2017-12-01 09:23:16Z santu $\n# Description: Auto-generated from advisory USN-744-1 (lcms)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"The problem can be corrected by upgrading your system to the\n following package versions:\n\nUbuntu 6.06 LTS:\n liblcms1 1.13-1ubuntu0.2\n\nUbuntu 7.10:\n liblcms1 1.16-5ubuntu3.2\n python-liblcms 1.16-5ubuntu3.2\n\nUbuntu 8.04 LTS:\n liblcms1 1.16-7ubuntu1.2\n python-liblcms 1.16-7ubuntu1.2\n\nUbuntu 8.10:\n liblcms1 1.16-10ubuntu0.2\n python-liblcms 1.16-10ubuntu0.2\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=USN-744-1\";\n\ntag_insight = \"Chris Evans discovered that LittleCMS did not properly handle certain error\nconditions, resulting in a large memory leak. If a user or automated system\nwere tricked into processing an image with malicious ICC tags, a remote\nattacker could cause a denial of service. (CVE-2009-0581)\n\nChris Evans discovered that LittleCMS contained multiple integer overflows.\nIf a user or automated system were tricked into processing an image with\nmalicious ICC tags, a remote attacker could crash applications linked\nagainst liblcms1, leading to a denial of service, or possibly execute\narbitrary code with user privileges. (CVE-2009-0723)\n\nChris Evans discovered that LittleCMS did not properly perform bounds\nchecking, leading to a buffer overflow. If a user or automated system were\ntricked into processing an image with malicious ICC tags, a remote attacker\ncould execute arbitrary code with user privileges. (CVE-2009-0733)\";\ntag_summary = \"The remote host is missing an update to lcms\nannounced via advisory USN-744-1.\";\n\n \n\n\nif(description)\n{\n script_id(64170);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)\");\n script_cve_id(\"CVE-2009-0581\", \"CVE-2009-0723\", \"CVE-2009-0733\", \"CVE-2009-0920\", \"CVE-2009-0921\", \"CVE-2009-0927\", \"CVE-2009-0207\", \"CVE-2009-0928\", \"CVE-2009-0193\", \"CVE-2009-0629\", \"CVE-2009-0626\", \"CVE-2009-0628\", \"CVE-2009-0635\", \"CVE-2009-0633\", \"CVE-2009-0634\", \"CVE-2009-0637\", \"CVE-2009-0784\", \"CVE-2009-0698\", \"CVE-2008-5239\", \"CVE-2008-1036\", \"CVE-2008-4316\", \"CVE-2006-2426\", \"CVE-2009-1093\", \"CVE-2009-1094\", \"CVE-2009-1095\", \"CVE-2009-1096\", \"CVE-2009-1097\", \"CVE-2009-1098\", \"CVE-2009-1100\", \"CVE-2009-1101\", \"CVE-2009-1102\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu USN-744-1 (lcms)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-744-1/\");\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"liblcms1-dev\", ver:\"1.13-1ubuntu0.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1\", ver:\"1.13-1ubuntu0.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms-utils\", ver:\"1.13-1ubuntu0.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1-dev\", ver:\"1.16-5ubuntu3.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1\", ver:\"1.16-5ubuntu3.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms-utils\", ver:\"1.16-5ubuntu3.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-liblcms\", ver:\"1.16-5ubuntu3.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1-dev\", ver:\"1.16-7ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1\", ver:\"1.16-7ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms-utils\", ver:\"1.16-7ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-liblcms\", ver:\"1.16-7ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1-dev\", ver:\"1.17.dfsg-1+lenny2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1\", ver:\"1.17.dfsg-1+lenny2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms-utils\", ver:\"1.17.dfsg-1+lenny2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-liblcms\", ver:\"1.17.dfsg-1+lenny2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemtap\", ver:\"0.0.20080705-1+lenny1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-dev\", ver:\"1.1.1+ubuntu2-7.11\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-main1\", ver:\"1.1.1+ubuntu2-7.11\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-dev\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-doc\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-plugins\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-dbg\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-console\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-ffmpeg\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-gnome\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-doc\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-all-plugins\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-plugins\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-dev\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-bin\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-console\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-dbg\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-misc-plugins\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-x\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-ffmpeg\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-gnome\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-doc\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-all-plugins\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-plugins\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-dev\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-bin\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-console\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-dbg\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-ffmpeg\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-gnome\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-misc-plugins\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-x\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icu-doc\", ver:\"3.4.1a-1ubuntu1.6.06.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu34-dev\", ver:\"3.4.1a-1ubuntu1.6.06.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu34\", ver:\"3.4.1a-1ubuntu1.6.06.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icu-doc\", ver:\"3.6-3ubuntu0.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu36-dev\", ver:\"3.6-3ubuntu0.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu36\", ver:\"3.6-3ubuntu0.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icu-doc\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lib32icu-dev\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lib32icu38\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu-dev\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu38-dbg\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu38\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icu-doc\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lib32icu-dev\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lib32icu38\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu-dev\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu38-dbg\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu38\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-doc\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-jre-lib\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-source\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-source-files\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icedtea6-plugin\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-dbg\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-demo\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-jdk\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-jre-headless\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-jre\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:29:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1095", "CVE-2009-1093", "CVE-2009-0733", "CVE-2009-1096", "CVE-2008-5239", "CVE-2009-0921", "CVE-2009-1097", "CVE-2009-0928", "CVE-2009-0207", "CVE-2009-0626", "CVE-2009-0723", "CVE-2008-4316", "CVE-2009-0637", "CVE-2009-0629", "CVE-2009-0584", "CVE-2009-0628", "CVE-2009-0784", "CVE-2009-1100", "CVE-2009-0583", "CVE-2009-0635", "CVE-2009-0927", "CVE-2009-1098", "CVE-2009-0698", "CVE-2009-1094", "CVE-2006-2426", "CVE-2009-0193", "CVE-2009-0920", "CVE-2008-1036", "CVE-2009-1101", "CVE-2009-1102", "CVE-2009-0633", "CVE-2009-0581", "CVE-2009-0634"], "description": "The remote host is missing an update to gs-gpl\nannounced via advisory USN-743-1.", "modified": "2017-12-01T00:00:00", "published": "2009-06-05T00:00:00", "id": "OPENVAS:64169", "href": "http://plugins.openvas.org/nasl.php?oid=64169", "type": "openvas", "title": "Ubuntu USN-743-1 (gs-gpl)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: ubuntu_743_1.nasl 7969 2017-12-01 09:23:16Z santu $\n# $Id: ubuntu_743_1.nasl 7969 2017-12-01 09:23:16Z santu $\n# Description: Auto-generated from advisory USN-743-1 (gs-gpl)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"The problem can be corrected by upgrading your system to the\n following package versions:\n\nUbuntu 6.06 LTS:\n gs-gpl 8.15-4ubuntu3.2\n\nUbuntu 7.10:\n libgs8 8.61.dfsg.1~svn8187-0ubuntu3.5\n\nUbuntu 8.04 LTS:\n libgs8 8.61.dfsg.1-1ubuntu3.1\n\nUbuntu 8.10:\n libgs8 8.63.dfsg.1-0ubuntu6.3\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=USN-743-1\";\n\ntag_insight = \"It was discovered that Ghostscript contained multiple integer overflows in\nits ICC color management library. If a user or automated system were\ntricked into opening a crafted Postscript file, an attacker could cause a\ndenial of service or execute arbitrary code with privileges of the user\ninvoking the program. (CVE-2009-0583)\n\nIt was discovered that Ghostscript did not properly perform bounds checking\nin its ICC color management library. If a user or automated system were\ntricked into opening a crafted Postscript file, an attacker could cause a\ndenial of service or execute arbitrary code with privileges of the user\ninvoking the program. (CVE-2009-0584)\";\ntag_summary = \"The remote host is missing an update to gs-gpl\nannounced via advisory USN-743-1.\";\n\n \n\n\nif(description)\n{\n script_id(64169);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-05 18:04:08 +0200 (Fri, 05 Jun 2009)\");\n script_cve_id(\"CVE-2009-0583\", \"CVE-2009-0584\", \"CVE-2009-0581\", \"CVE-2009-0723\", \"CVE-2009-0733\", \"CVE-2009-0920\", \"CVE-2009-0921\", \"CVE-2009-0927\", \"CVE-2009-0207\", \"CVE-2009-0928\", \"CVE-2009-0193\", \"CVE-2009-0629\", \"CVE-2009-0626\", \"CVE-2009-0628\", \"CVE-2009-0635\", \"CVE-2009-0633\", \"CVE-2009-0634\", \"CVE-2009-0637\", \"CVE-2009-0784\", \"CVE-2009-0698\", \"CVE-2008-5239\", \"CVE-2008-1036\", \"CVE-2008-4316\", \"CVE-2006-2426\", \"CVE-2009-1093\", \"CVE-2009-1094\", \"CVE-2009-1095\", \"CVE-2009-1096\", \"CVE-2009-1097\", \"CVE-2009-1098\", \"CVE-2009-1100\", \"CVE-2009-1101\", \"CVE-2009-1102\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Ubuntu USN-743-1 (gs-gpl)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-743-1/\");\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"gs\", ver:\"8.15-4ubuntu3.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-gpl\", ver:\"8.15-4ubuntu3.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-doc\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-esp-x\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-gpl\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs-esp-dev\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-aladdin\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-common\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-esp\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-x\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs-dev\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs8\", ver:\"8.61.dfsg.1~svn8187-0ubuntu3.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-doc\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-gpl\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs-esp-dev\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-aladdin\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-common\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-esp-x\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-esp\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-x\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs-dev\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs8\", ver:\"8.61.dfsg.1-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-doc\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-common\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-gpl\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs-esp-dev\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-aladdin\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-esp-x\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gs-esp\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript-x\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ghostscript\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs-dev\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libgs8\", ver:\"8.63.dfsg.1-0ubuntu6.3\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1-dev\", ver:\"1.13-1ubuntu0.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1\", ver:\"1.13-1ubuntu0.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms-utils\", ver:\"1.13-1ubuntu0.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1-dev\", ver:\"1.16-5ubuntu3.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1\", ver:\"1.16-5ubuntu3.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms-utils\", ver:\"1.16-5ubuntu3.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-liblcms\", ver:\"1.16-5ubuntu3.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1-dev\", ver:\"1.16-7ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1\", ver:\"1.16-7ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms-utils\", ver:\"1.16-7ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-liblcms\", ver:\"1.16-7ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1-dev\", ver:\"1.17.dfsg-1+lenny2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms1\", ver:\"1.17.dfsg-1+lenny2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"liblcms-utils\", ver:\"1.17.dfsg-1+lenny2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"python-liblcms\", ver:\"1.17.dfsg-1+lenny2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemtap\", ver:\"0.0.20080705-1+lenny1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-dev\", ver:\"1.1.1+ubuntu2-7.11\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-main1\", ver:\"1.1.1+ubuntu2-7.11\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-dev\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-doc\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-plugins\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-dbg\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-console\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-ffmpeg\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-gnome\", ver:\"1.1.7-1ubuntu1.5\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-doc\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-all-plugins\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-plugins\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-dev\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-bin\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-console\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-dbg\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-misc-plugins\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-x\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-ffmpeg\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-gnome\", ver:\"1.1.11.1-1ubuntu3.3\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-doc\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-all-plugins\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-plugins\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine-dev\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-bin\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-console\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-dbg\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-ffmpeg\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-gnome\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-misc-plugins\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1-x\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libxine1\", ver:\"1.1.15-0ubuntu3.2\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icu-doc\", ver:\"3.4.1a-1ubuntu1.6.06.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu34-dev\", ver:\"3.4.1a-1ubuntu1.6.06.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu34\", ver:\"3.4.1a-1ubuntu1.6.06.2\", rls:\"UBUNTU6.06 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icu-doc\", ver:\"3.6-3ubuntu0.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu36-dev\", ver:\"3.6-3ubuntu0.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu36\", ver:\"3.6-3ubuntu0.2\", rls:\"UBUNTU7.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icu-doc\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lib32icu-dev\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lib32icu38\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu-dev\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu38-dbg\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu38\", ver:\"3.8-6ubuntu0.1\", rls:\"UBUNTU8.04 LTS\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icu-doc\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lib32icu-dev\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lib32icu38\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu-dev\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu38-dbg\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libicu38\", ver:\"3.8.1-2ubuntu0.1\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-doc\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-jre-lib\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-source\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-source-files\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"icedtea6-plugin\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-dbg\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-demo\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-jdk\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-jre-headless\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openjdk-6-jre\", ver:\"6b12-0ubuntu6.4\", rls:\"UBUNTU8.10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}