{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T04:34:07.896","vulnerabilities":[{"cve":{"id":"CVE-2010-2090","sourceIdentifier":"cve@mitre.org","published":"2010-05-27T19:30:01.890","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The npb_protocol_error function in sna V5router64 in IBM Communications Server for Windows 6.1.3 and Communications Server for AIX (aka CSAIX or CS/AIX) in sna.rte before 6.3.1.2 allows remote attackers to cause a denial of service (daemon crash) via APPC data containing a GDSID variable with a GDS length that is too small."},{"lang":"es","value":"La función pb_protocol_error en sna V5router64 en IBM Communications Server para Windows v6.1.3 y Communications Server para AIX (también conocido como CSAIX o CS/AIX) en sna.rte anterior a v6.3.1.2 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de datos APPC que contienen una variable GDSID con un GDS con una logitud demasiado pequeña."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","matchCriteriaId":"2CF61F35-5905-4BA9-AD7E-7DB261D2F256"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:communications_server:6.1.3:*:*:*:*:*:*:*","matchCriteriaId":"30C2778F-9F0A-4B67-8A7B-725E25E03E11"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:communications_server:6.3.1.0:*:*:*:*:*:*:*","matchCriteriaId":"77F3AAB4-7622-42FA-8B8A-62D937727FEA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*","matchCriteriaId":"F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:communications_server:6.1.3:*:*:*:*:*:*:*","matchCriteriaId":"30C2778F-9F0A-4B67-8A7B-725E25E03E11"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:communications_server:6.3.1.0:*:*:*:*:*:*:*","matchCriteriaId":"77F3AAB4-7622-42FA-8B8A-62D937727FEA"}]}]}],"references":[{"url":"http://secunia.com/advisories/39909","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ68810","source":"cve@mitre.org"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1JR36026","source":"cve@mitre.org"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24013012","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/40372","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2010/1244","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/58874","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/39909","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ68810","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1JR36026","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24013012","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/40372","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2010/1244","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/58874","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}