{ "id": "CVE-2016-1380", "sourceIdentifier": "ykramarz@cisco.com", "published": "2016-05-25T01:59:04.020", "lastModified": "2016-12-01T03:05:23.993", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Cisco AsyncOS 8.0 before 8.0.6-119 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (proxy-process hang) via a crafted HTTP POST request, aka Bug ID CSCuo12171." }, { "lang": "es", "value": "Cisco AsyncOS 8.0 en versiones anteriores a 8.0.6-119 en dispositivos Web Security Appliance (WSA) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (colgado del proceso proxy) a trav\u00e9s de una petici\u00f3n HTTP POST manipulada, tambi\u00e9n conocida como Bug ID CSCuo12171." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F24CCD0-DFAB-44D9-B29A-A6D925A83C93" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*", "matchCriteriaId": "33C867BF-2CD0-4058-9738-22C769B03D97" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AFBF729F-2AD0-4291-AF41-184CCA230D28" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "9D8750D2-5250-43BE-AC50-981902C0CF5C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-078:*:*:*:*:*:*:*", "matchCriteriaId": "A5A171CD-A1FB-44AE-B252-9916626AEEDD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.6-119:*:*:*:*:*:*:*", "matchCriteriaId": "D6003553-A114-42E0-B817-D176F3A6112B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "892F3569-985A-43FD-8A65-440A528A29FD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.7-142:*:*:*:*:*:*:*", "matchCriteriaId": "7514E1C3-42DC-4738-AF6C-3004FAC5BD6C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.0.8-mr-113:*:*:*:*:*:*:*", "matchCriteriaId": "C62AB23C-9F58-403D-B0E7-8ED3F5A4FE1B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-000:*:*:*:*:*:*:*", "matchCriteriaId": "7D725328-3720-4C45-BF53-295A70BFCD92" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*", "matchCriteriaId": "3E9AF842-92F9-43A7-834A-0FFB3B619EDA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.1-021:*:*:*:*:*:*:*", "matchCriteriaId": "8C75625C-3C19-4449-B992-279325170CD2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-024:*:*:*:*:*:*:*", "matchCriteriaId": "4954BDC0-0A4B-4EF7-BFD2-2FF6FAE2FCA4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.2-027:*:*:*:*:*:*:*", "matchCriteriaId": "F4F98B8B-8B27-4253-B8EF-5782F57DB654" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:web_security_appliance:8.5.3-055:*:*:*:*:*:*:*", "matchCriteriaId": "729E3778-4BCA-46C6-AF3D-A2C10CDDB1F1" } ] } ] } ], "references": [ { "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160518-wsa1", "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securitytracker.com/id/1035908", "source": "ykramarz@cisco.com" } ] }