Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-0233

Опубликовано: 19 апр. 2018
Источник: nvd
CVSS3: 8.6
CVSS2: 7.8
EPSS Низкий

Описание

A vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system memory on an affected device, which could cause a denial of service (DoS) condition. The vulnerability is due to the affected software improperly handling changes to SSL connection states. An attacker could exploit this vulnerability by sending crafted SSL connections through an affected device. A successful exploit could allow the attacker to cause the detection engine to consume excessive system memory on the affected device, which could cause a DoS condition. The device may need to be reloaded manually to recover from this condition. This vulnerability affects Cisco Firepower System Software Releases 6.0.0 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Firewalls with FirePOWER Serv

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*

EPSS

Процентиль: 65%
0.00484
Низкий

8.6 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-400
CWE-400

Связанные уязвимости

CVSS3: 8.6
github
больше 3 лет назад

A vulnerability in the Secure Sockets Layer (SSL) packet reassembly functionality of the detection engine in Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the detection engine to consume excessive system memory on an affected device, which could cause a denial of service (DoS) condition. The vulnerability is due to the affected software improperly handling changes to SSL connection states. An attacker could exploit this vulnerability by sending crafted SSL connections through an affected device. A successful exploit could allow the attacker to cause the detection engine to consume excessive system memory on the affected device, which could cause a DoS condition. The device may need to be reloaded manually to recover from this condition. This vulnerability affects Cisco Firepower System Software Releases 6.0.0 and later, running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series Firewalls with FirePOWER S...

CVSS3: 8.6
fstec
почти 7 лет назад

Уязвимость функции повторной сборки пакетов модуля Secure Sockets Layer (SSL) системы предотвращения вторжений Cisco Firepower System Software, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 65%
0.00484
Низкий

8.6 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-400
CWE-400