CVE-2014-3402 (GCVE-0-2014-3402)
Vulnerability from cvelistv5 – Published: 2014-10-10 10:00 – Updated: 2024-08-06 10:43
VLAI?
Summary
The authentication-manager process in the web framework in Cisco Intrusion Prevention System (IPS) 7.0(8)E4 and earlier in Cisco Intrusion Detection System (IDS) does not properly manage user tokens, which allows remote attackers to cause a denial of service (temporary MainApp hang) via a crafted connection request to the management interface, aka Bug ID CSCuq39550.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:43:05.824Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36014"
},
{
"name": "20141007 Cisco Intrusion Prevention System MainApp Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3402"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-10-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The authentication-manager process in the web framework in Cisco Intrusion Prevention System (IPS) 7.0(8)E4 and earlier in Cisco Intrusion Detection System (IDS) does not properly manage user tokens, which allows remote attackers to cause a denial of service (temporary MainApp hang) via a crafted connection request to the management interface, aka Bug ID CSCuq39550."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-10-10T05:57:00",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36014"
},
{
"name": "20141007 Cisco Intrusion Prevention System MainApp Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3402"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-3402",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The authentication-manager process in the web framework in Cisco Intrusion Prevention System (IPS) 7.0(8)E4 and earlier in Cisco Intrusion Detection System (IDS) does not properly manage user tokens, which allows remote attackers to cause a denial of service (temporary MainApp hang) via a crafted connection request to the management interface, aka Bug ID CSCuq39550."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36014",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36014"
},
{
"name": "20141007 Cisco Intrusion Prevention System MainApp Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3402"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2014-3402",
"datePublished": "2014-10-10T10:00:00",
"dateReserved": "2014-05-07T00:00:00",
"dateUpdated": "2024-08-06T10:43:05.824Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"7.0\\\\(8\\\\)e4\", \"matchCriteriaId\": \"FCD4BC15-7211-4DE7-A1CD-A95515A66FD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03105E7F-12F8-4497-8A27-BD2F1653FD38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(1\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32F57CD3-EA32-4814-A021-3CEB23900E18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(2\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDCEF522-431E-49D3-84F8-24EBE0D03E0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(2\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5961030A-ADD4-4BA6-A691-275DE6D9E1B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(3\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21F422BC-E40B-4EC6-B0A5-7CD3A3C92B4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(4\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04BA1FCB-DF1B-42E5-BBF3-808119AF80ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(5a\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6074CC8-4A49-4A31-809F-B87E4B80D179\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(6\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20548D0B-8B3C-468F-8966-13019C4D69C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(7\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3206DA6-FE23-4214-A1F8-3C212C2768BB\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The authentication-manager process in the web framework in Cisco Intrusion Prevention System (IPS) 7.0(8)E4 and earlier in Cisco Intrusion Detection System (IDS) does not properly manage user tokens, which allows remote attackers to cause a denial of service (temporary MainApp hang) via a crafted connection request to the management interface, aka Bug ID CSCuq39550.\"}, {\"lang\": \"es\", \"value\": \"El proceso de gesti\\u00f3n de autenticaci\\u00f3n en el Framework web en Cisco Intrusion Prevention System (IPS) 7.0(8)E4 y anteriiores en Cisco Intrusion Detection System (IDS) no maneja debidamente los tokens de usuarios, lo que permite a atacantes remotos causar una denegaci\\u00f3n de servicio (cuelgue temporal de MainApp) a trav\\u00e9s de una solicitud de conexi\\u00f3n manipulada a la interfaz de gesti\\u00f3n, tambi\\u00e9n conocido como Bug ID CSCuq39550.\"}]",
"id": "CVE-2014-3402",
"lastModified": "2024-11-21T02:08:01.057",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-10-10T10:55:06.727",
"references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3402\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/viewAlert.x?alertId=36014\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3402\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/viewAlert.x?alertId=36014\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-3402\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2014-10-10T10:55:06.727\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The authentication-manager process in the web framework in Cisco Intrusion Prevention System (IPS) 7.0(8)E4 and earlier in Cisco Intrusion Detection System (IDS) does not properly manage user tokens, which allows remote attackers to cause a denial of service (temporary MainApp hang) via a crafted connection request to the management interface, aka Bug ID CSCuq39550.\"},{\"lang\":\"es\",\"value\":\"El proceso de gesti\u00f3n de autenticaci\u00f3n en el Framework web en Cisco Intrusion Prevention System (IPS) 7.0(8)E4 y anteriiores en Cisco Intrusion Detection System (IDS) no maneja debidamente los tokens de usuarios, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (cuelgue temporal de MainApp) a trav\u00e9s de una solicitud de conexi\u00f3n manipulada a la interfaz de gesti\u00f3n, tambi\u00e9n conocido como Bug ID CSCuq39550.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.0\\\\(8\\\\)e4\",\"matchCriteriaId\":\"FCD4BC15-7211-4DE7-A1CD-A95515A66FD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03105E7F-12F8-4497-8A27-BD2F1653FD38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(1\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F57CD3-EA32-4814-A021-3CEB23900E18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(2\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDCEF522-431E-49D3-84F8-24EBE0D03E0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(2\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5961030A-ADD4-4BA6-A691-275DE6D9E1B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(3\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F422BC-E40B-4EC6-B0A5-7CD3A3C92B4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(4\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04BA1FCB-DF1B-42E5-BBF3-808119AF80ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(5a\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6074CC8-4A49-4A31-809F-B87E4B80D179\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(6\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20548D0B-8B3C-468F-8966-13019C4D69C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\\\(7\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3206DA6-FE23-4214-A1F8-3C212C2768BB\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3402\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/viewAlert.x?alertId=36014\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/viewAlert.x?alertId=36014\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…