CNVD-2017-02019

Vulnerability from cnvd - Published: 2017-02-25
VLAI Severity ?
Title
Cisco Adaptive Security Appliance Software堆缓冲区溢出漏洞
Description
Cisco Adaptive Security Appliances(ASA,自适应安全设备)Software是美国思科(Cisco)公司的一套运行于防火墙中的操作系统。 Cisco Adaptive Security Appliance Software存在堆缓冲区溢出漏洞。攻击者可利用此漏洞在受影响应用程序的上下文中执行任意代码,失败的攻击会导致拒绝服务。
Severity
Patch Name
Cisco Adaptive Security Appliance Software堆缓冲区溢出漏洞的补丁
Patch Description
Cisco Adaptive Security Appliances(ASA,自适应安全设备)Software是美国思科(Cisco)公司的一套运行于防火墙中的操作系统。 Cisco Adaptive Security Appliance Software存在堆缓冲区溢出漏洞。攻击者可利用此漏洞在受影响应用程序的上下文中执行任意代码,失败的攻击会导致拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa

Reference
http://www.securityfocus.com/bid/96161
Impacted products
Name
['Cisco ASA 5500-X Series Next-Generation Firewalls', 'Cisco Adaptive Security Virtual Appliance (ASAv)', 'Cisco ISA 3000 Industrial Security Appliance', 'Cisco ASA 5500 Series Adaptive Security Appliances', 'Cisco ASA for Firepower 9300 Series', 'Cisco ASA for Firepower 4100 Series']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "96161"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-3807",
      "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3807"
    }
  },
  "description": "Cisco Adaptive Security Appliances\uff08ASA\uff0c\u81ea\u9002\u5e94\u5b89\u5168\u8bbe\u5907\uff09Software\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u8fd0\u884c\u4e8e\u9632\u706b\u5899\u4e2d\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco Adaptive Security Appliance Software\u5b58\u5728\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u5e94\u7528\u7a0b\u5e8f\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u5931\u8d25\u7684\u653b\u51fb\u4f1a\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
  "discovererName": "Cisco",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170208-asa",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-02019",
  "openTime": "2017-02-25",
  "patchDescription": "Cisco Adaptive Security Appliances\uff08ASA\uff0c\u81ea\u9002\u5e94\u5b89\u5168\u8bbe\u5907\uff09Software\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u8fd0\u884c\u4e8e\u9632\u706b\u5899\u4e2d\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco Adaptive Security Appliance Software\u5b58\u5728\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u5e94\u7528\u7a0b\u5e8f\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u5931\u8d25\u7684\u653b\u51fb\u4f1a\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Cisco Adaptive Security Appliance Software\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Cisco ASA 5500-X Series Next-Generation Firewalls",
      "Cisco Adaptive Security Virtual Appliance (ASAv)",
      "Cisco ISA 3000 Industrial Security Appliance",
      "Cisco ASA 5500 Series Adaptive Security Appliances",
      "Cisco ASA for Firepower 9300 Series",
      "Cisco ASA for Firepower 4100 Series"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/96161",
  "serverity": "\u9ad8",
  "submitTime": "2017-02-17",
  "title": "Cisco Adaptive Security Appliance Software\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…