Описание
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | DNE | |
| esm-apps/bionic | needed | |
| esm-apps/focal | needed | |
| esm-apps/jammy | not-affected | 2.9.15.1-5 |
| esm-apps/noble | not-affected | 2.9.15.1-5 |
| esm-apps/xenial | needed | |
| esm-infra-legacy/trusty | needed | |
| focal | ignored | end of standard support, was needed |
| impish | not-affected | 2.9.15.1-5 |
Показывать по
5 Medium
CVSS2
5.8 Medium
CVSS3
Связанные уязвимости
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.
Multiple Cisco products are affected by a vulnerability in the Snort d ...
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured File Policy for HTTP. The vulnerability is due to incorrect detection of modified HTTP packets used in chunked responses. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured File Policy for HTTP packets and deliver a malicious payload.
Уязвимость системы обнаружения вторжений Snort микропрограммного обеспечения межсетевого экрана Cisco Firepower Threat Defense (FTD), программно-определяемой сети Cisco SD-WAN, межсетевой операционной системы Cisco IOS XE и микропрограммного обеспечения cетевых устройств Cisco Meraki, позволяющая нарушителю обойти механизм защиты и выполнить вредоносную нагрузку
5 Medium
CVSS2
5.8 Medium
CVSS3