Cisco Web Security Appliances の AsyncOS ソフトウェアにおけるリソースの枯渇に関する脆弱性
| Title |
Cisco Web Security Appliances の AsyncOS ソフトウェアにおけるリソースの枯渇に関する脆弱性
|
| Summary |
Cisco Web Security Appliances の AsyncOS ソフトウェアには、リソースの枯渇に関する脆弱性が存在します。 ベンダは、本脆弱性を Bug ID CSCvf36610 として公開しています。
|
| Possible impacts |
サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
|
| Publication Date |
Aug. 15, 2018, midnight |
| Registration Date |
Nov. 12, 2018, 12:29 p.m. |
| Last Update |
Nov. 12, 2018, 12:29 p.m. |
|
CVSS3.0 : 重要
|
| Score |
8.6
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.8
|
| Vector |
AV:N/AC:L/Au:N/C:N/I:N/A:C |
Affected System
| シスコシステムズ |
|
Cisco Web セキュリティ アプライアンス
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年11月12日] 掲載 |
Nov. 12, 2018, 12:29 p.m. |
NVD Vulnerability Information
CVE-2018-0410
| Summary |
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected software improperly manages memory resources for TCP connections to a targeted device. An attacker could exploit this vulnerability by establishing a high number of TCP connections to the data interface of an affected device via IPv4 or IPv6. A successful exploit could allow the attacker to exhaust system memory, which could cause the system to stop processing new connections and result in a DoS condition. System recovery may require manual intervention. Cisco Bug IDs: CSCvf36610.
|
| Publication Date |
Aug. 16, 2018, 5:29 a.m. |
| Registration Date |
March 1, 2021, 6:36 p.m. |
| Last Update |
Nov. 21, 2024, 12:38 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:cisco:web_security_appliance:10.1.0-204:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:web_security_appliance:9.1.1-074:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:web_security_appliance:10.5.1-270:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:web_security_appliance:11.0.0-641:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:web_security_appliance:10.1.1-235:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:web_security_appliance:9.1.2-010:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:web_security_appliance:10.5.1-296:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:web_security_appliance:10.5.2-042:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:web_security_appliance:9.1.2-022:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:cisco:web_security_appliance:9.1.2-039:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List