mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
407 lines
18 KiB
JSON
407 lines
18 KiB
JSON
{
|
|
"id": "CVE-2016-6399",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2016-09-12T10:59:11.507",
|
|
"lastModified": "2016-11-28T20:32:12.133",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco ACE30 Application Control Engine Module through A5 3.3 and ACE 4700 Application Control Engine appliances through A5 3.3 allow remote attackers to cause a denial of service (device reload) via crafted (1) SSL or (2) TLS packets, aka Bug ID CSCvb16317."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Dispositivos Cisco ACE30 Application Control Engine Module hasta la versi\u00f3n A5 3.3 y ACE 4700 Application Control Engine hasta la versi\u00f3n A5 3.3 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de paquetes (1) SSL o (2) TLS manipulados, vulnerabilidad tambi\u00e9n conocida como Bug ID CSCvb16317."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.8
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a1:7a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36B95E42-77DA-4AFB-A159-7809CD95D24B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a1:7b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "968D39EB-5481-4698-B3A9-C2E90BFD88FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a1:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DE5326B-B86B-434B-B86A-8703CD1CA872"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a1:8.0a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0625AAB8-ADA5-4495-8A01-87DAE0C573B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3583B054-0D5D-41AD-8508-0E5D87491045"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F7170B3-B3DA-4667-8ADE-09EA0D17C37F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9DE45DC-11D4-429C-890F-F9E117930AF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "680510A7-CF93-4C86-A556-F0C9511AF3B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C10C1C9-356A-4D47-BB4B-58AD940199E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "521441F7-8388-4F58-A262-6B8057209FDB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09CB323B-7913-4B2F-AE69-95D34ED6A83F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a3:2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7722C303-3AE4-4078-947B-7A648FC5477E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0786FAF6-44D0-4F2E-952E-2CE4CEE30A26"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DAB9C402-2A7B-4701-A260-46C6D0E63050"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F40CA11-A160-4307-9305-28DA4938945B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.1a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "430CA0DA-0402-4FFB-9170-7F08DE70C36C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17BEDD60-ACF6-441E-85B0-8E93C6F5CE41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a4:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BF39113-6665-484B-AA2E-2FB49BCDEC51"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07AABE9B-4A09-477F-A139-7CB40C14AA55"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0FF5BA5-AC61-4244-A7C2-F9811AD13C9C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F571AD7F-14B9-498C-8F06-D1DF61B6EF35"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56B2425F-7EFA-4599-8A7E-2B0454A58077"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8A6203D-DF5E-46B9-BFCD-D41FC729193F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:2.1e:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDB594F8-3673-42E8-8E8B-996DEA75E815"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FEFB0D00-A082-4930-9D6D-CFB1CDB632EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.1a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E975AAC-A44A-4042-80F5-959989B785AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.1b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "46FEAE36-71F8-40C9-954C-42B57CC1BE8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FAB49D71-F1FD-43E3-A245-50E4A2F62606"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:ace_application_control_engine_module_a5:3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "428DCAD9-B5AD-45DC-91D7-27535F286957"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(1.0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2091508E-84D9-496B-B4E1-9BAC927F982A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(1.1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2AB7E381-E849-42F6-8201-E32D1747E06E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(1.2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F266A5E5-9455-4EC5-BBF2-AAA2CA2A60AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(2.0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A23695F0-B2FE-46F1-9328-56B1EF00A112"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(2.1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4239B16-7380-48E4-992D-479351DF1AC9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(2.1e\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E476F81E-7F90-442A-8FF1-45FCFCF096C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5\\(3.0\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6351F63A-D5B2-4EE3-AC7D-3CDA0A217E5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance:a5_base:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CE7CF67-7B2F-40A1-8F52-639483094568"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ED884ACC-89C8-461D-A238-36316F507441"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:7a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8EE014E6-0224-402B-AFF0-7B7FA67382A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:7b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C8FF44C-CC30-43F7-832E-C88390482CA8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F7DF627-2A9D-42CD-9929-26A32E687F00"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a1:8.0a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FA7B42BF-80B8-40AB-BAF9-9E73216F8524"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE68EF35-7CD7-49A3-A143-4C47012C012D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ABAB9218-3909-4B08-92EC-8431FC5C8D76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A4F2BEAC-D53A-4630-8530-ED24ACC820A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "659F4ACE-9564-45AC-B85D-D0625853FFA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2539AF6-E914-4279-A54D-2E7652AFD7D0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2917FB57-2BBF-4A77-AEE7-C6D660D44A20"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1863CF65-736C-44BD-80A2-B9DE33A4797A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a3:2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2ABB8883-0476-4E83-9F75-40ABFF806786"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F8264DF-8037-4A4C-8C08-E332E9649347"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B4DC4A0-44E9-41C1-99A7-82499AC8577B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38482D95-999B-4A40-A37A-71150E48ED50"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.1a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "90762C72-8DA2-446C-B3A8-DC9DCB33DD06"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD6BAEB1-8271-475F-ADD0-D3EDF0773DF4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a4:2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7CDF5356-429E-4CD5-8031-5E52CF3FF118"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.1a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39AB46CA-9775-4EC8-8419-13B0224251BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.1b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E50A418B-1AC6-40BA-B80B-29313C95F030"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C673B2B9-2A26-47C2-B553-2AE8A41916AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:cisco:ace_4700_series_application_control_engine_appliance_a5:3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3AD80BBE-813F-4B2E-B05D-3A96686FA8D4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/92867",
|
|
"source": "ykramarz@cisco.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1036748",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |