CVE-2007-5568 (CNNVD-200710-368)

HIGH
中文标题:
Cisco Adaptive Security Appliance 输入验证错误漏洞
英文标题:
Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM...
CVSS分数: 7.1
发布时间: 2007-10-18 21:00:00
漏洞类型: 输入验证错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Adaptive Security Appliances Software(ASA Software)是美国思科(Cisco)公司的一套防火墙和网络安全平台。该平台提供了对数据和网络资源的高度安全的访问等功能。 Cisco Adaptive Security Appliance存在输入验证错误漏洞,该漏洞源于Cisco PIX和ASA设备在处理MGCP及TLS畸形报文时存在漏洞,远程攻击者可能利用这些漏洞导致设备拒绝服务。 如果处理了特制MGCP报文的话,则启用了MGCP应用层协议检查功能的PIX或ASA安全设备可能重载。MGCP应用层协议检查不是默认启用的。MGCP消息是通过用户数据报协议(UDP)传输的,这允许从伪造地址发起特制的MGCP消息。仅有网关应用的MGCP(UDP 2427端口上的MGCP通讯)才受影响。

英文描述:

Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and CSCsi00694 (FWSM).

CWE类型:
CWE-20
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco firewall_services_module * - - cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.0 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.0\(4\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\(4\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.0\(5\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\(5\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.0\(5.2\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\(5.2\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.0\(6.7\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\(6.7\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.0.1.4 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.0.4.3 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.1\(2\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.1\(2.5\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2.5\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.1\(2.27\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2.27\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.1\(2.48\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2.48\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.1\(2.49\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\(2.49\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(1\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(1\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(1.22\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(1.22\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(2\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(2.7\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.7\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(2.8\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.8\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(2.10\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.10\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(2.14\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.14\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(2.15\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.15\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(2.16\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.16\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(2.17\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.17\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 7.2\(2.19\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\(2.19\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.0 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
cisco-asa-pix-mgcp-dos(37259) vdb-entry
cve.org
访问
20071017 Multiple Vulnerabilities in Cisco PIX and ASA Appliance vendor-advisory
cve.org
访问
1018827 vdb-entry
cve.org
访问
27193 third-party-advisory
cve.org
访问
26109 vdb-entry
cve.org
访问
20071017 Multiple Vulnerabilities in Firewall Services Module vendor-advisory
cve.org
访问
1018825 vdb-entry
cve.org
访问
ADV-2007-3531 vdb-entry
cve.org
访问
cisco-fwsm-mgcp-dos(37257) vdb-entry
cve.org
访问
ADV-2007-3530 vdb-entry
cve.org
访问
1018826 vdb-entry
cve.org
访问
27236 third-party-advisory
cve.org
访问
26104 vdb-entry
cve.org
访问
CVSS评分详情
7.1
HIGH
CVSS向量: AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS版本: 2.0
机密性
NONE
完整性
NONE
可用性
COMPLETE
时间信息
发布时间:
2007-10-18 21:00:00
修改时间:
2024-08-07 15:39:12
创建时间:
2025-11-11 15:32:47
更新时间:
2025-11-11 15:49:21
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2007-5568 2025-11-11 15:17:56 2025-11-11 07:32:47
NVD nvd_CVE-2007-5568 2025-11-11 14:52:12 2025-11-11 07:41:34
CNNVD cnnvd_CNNVD-200710-368 2025-11-11 15:08:59 2025-11-11 07:49:21
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:21
vulnerability_type: 未提取 → 输入验证错误; cnnvd_id: 未提取 → CNNVD-200710-368; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 输入验证错误
  • cnnvd_id: 未提取 -> CNNVD-200710-368
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:34
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.1; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:N/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 25; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.1
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:N/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 25
  • data_sources: ['cve'] -> ['cve', 'nvd']