Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w5gp-j3p5-92ch

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.

Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.

EPSS

Процентиль: 73%
0.00784
Низкий

7.5 High

CVSS3

Дефекты

CWE-241

Связанные уязвимости

CVSS3: 8.6
nvd
больше 4 лет назад

Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.

CVSS3: 8.6
fstec
больше 4 лет назад

Уязвимость системы обнаружения вторжений Snort микропрограммного обеспечения межсетевых экранов Cisco Firepower Threat Defense (FTD), связанная с использованием конфигурации «Блокировать со сбросом» или «Интерактивное блокирование со сбросом», позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 73%
0.00784
Низкий

7.5 High

CVSS3

Дефекты

CWE-241