var-201905-0247
Vulnerability from variot
Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Firepower Threat Defense (FTD) The software is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Exploiting these issues allow remote attackers to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCvj83264, CSCvj91418
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201905-0247", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "firepower threat defense", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "6.0.0" }, { "model": "firepower threat defense", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "6.2.3.12" }, { "model": "firepower threat defense software", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "next generation intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "firepower threat defense virtual", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "firepower threat defense software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3" }, { "model": "firepower threat defense software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.3" }, { "model": "firepower threat defense software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2" }, { "model": "firepower threat defense software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2" }, { "model": "firepower threat defense software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1" }, { "model": "firepower threat defense software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.1" }, { "model": "firepower threat defense software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0.1" }, { "model": "firepower threat defense software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0" }, { "model": "firepower threat defense for integrated services routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "firepower security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "93000" }, { "model": "firepower series appliances", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "80000" }, { "model": "firepower series appliances", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70000" }, { "model": "firepower series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "41000" }, { "model": "firepower series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "21000" }, { "model": "asa series with firepower services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5500-x0" }, { "model": "asa series firewalls", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5500-x0" }, { "model": "advanced malware protection series appliances", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70000" }, { "model": "series industrial security appliances", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "firepower threat defense software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.3.0.3" }, { "model": "firepower threat defense software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.2.3.12" } ], "sources": [ { "db": "BID", "id": "108171" }, { "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "db": "NVD", "id": "CVE-2019-1704" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.2.3.12", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-1704" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "108171" }, { "db": "CNNVD", "id": "CNNVD-201905-007" } ], "trust": 0.9 }, "cve": "CVE-2019-1704", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1704", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-149246", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-1704", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-1704", "trust": 1.8, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2019-1704", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201905-007", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-149246", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-149246" }, { "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "db": "NVD", "id": "CVE-2019-1704" }, { "db": "NVD", "id": "CVE-2019-1704" }, { "db": "CNNVD", "id": "CNNVD-201905-007" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Firepower Threat Defense (FTD) The software is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. \nExploiting these issues allow remote attackers to cause a denial-of-service condition. \nThis issue is being tracked by Cisco Bug ID CSCvj83264, CSCvj91418", "sources": [ { "db": "NVD", "id": "CVE-2019-1704" }, { "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "db": "BID", "id": "108171" }, { "db": "VULHUB", "id": "VHN-149246" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-1704", "trust": 2.8 }, { "db": "BID", "id": "108171", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2019-004456", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.1516", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201905-007", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-149246", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-149246" }, { "db": "BID", "id": "108171" }, { "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "db": "NVD", "id": "CVE-2019-1704" }, { "db": "CNNVD", "id": "CNNVD-201905-007" } ] }, "id": "VAR-201905-0247", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-149246" } ], "trust": 0.6916945099999999 }, "last_update_date": "2023-12-18T12:28:19.560000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20190501-frpwr-smb-snort", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-frpwr-smb-snort" }, { "title": "Cisco Firepower Threat Defense Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92158" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "db": "CNNVD", "id": "CNNVD-201905-007" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-149246" }, { "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "db": "NVD", "id": "CVE-2019-1704" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108171" }, { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-frpwr-smb-snort" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-1704" }, { "trust": 0.9, "url": "http://www.cisco.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1704" }, { "trust": 0.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-ftd-cmd-inject" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/80106" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/snort-denial-of-service-via-smb-29400" } ], "sources": [ { "db": "VULHUB", "id": "VHN-149246" }, { "db": "BID", "id": "108171" }, { "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "db": "NVD", "id": "CVE-2019-1704" }, { "db": "CNNVD", "id": "CNNVD-201905-007" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-149246" }, { "db": "BID", "id": "108171" }, { "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "db": "NVD", "id": "CVE-2019-1704" }, { "db": "CNNVD", "id": "CNNVD-201905-007" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-03T00:00:00", "db": "VULHUB", "id": "VHN-149246" }, { "date": "2019-05-01T00:00:00", "db": "BID", "id": "108171" }, { "date": "2019-06-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "date": "2019-05-03T16:29:00.490000", "db": "NVD", "id": "CVE-2019-1704" }, { "date": "2019-05-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-007" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-149246" }, { "date": "2019-05-01T00:00:00", "db": "BID", "id": "108171" }, { "date": "2019-06-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004456" }, { "date": "2019-10-09T23:47:46.457000", "db": "NVD", "id": "CVE-2019-1704" }, { "date": "2019-05-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-007" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-007" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Firepower Threat Defense Software depletion vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004456" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-007" } ], "trust": 0.6 } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.