Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-3315

Опубликовано: 06 мая 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 5
CVSS3: 5.3

Описание

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors in how the Snort detection engine handles specific HTTP responses. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

needed

esm-apps/noble

not-affected

2.9.16
esm-apps/xenial

needed

esm-infra-legacy/trusty

needed

focal

ignored

end of standard support, was needed
impish

ignored

end of life

Показывать по

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
почти 6 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors in how the Snort detection engine handles specific HTTP responses. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.

CVSS3: 5.3
debian
почти 6 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort d ...

CVSS3: 5.3
github
больше 3 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured file policies on an affected system. The vulnerability is due to errors in how the Snort detection engine handles specific HTTP responses. An attacker could exploit this vulnerability by sending crafted HTTP packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured file policies and deliver a malicious payload to the protected network.

CVSS3: 5.8
fstec
почти 6 лет назад

Уязвимость механизмов Snort операционной системы Cisco IOS, межсетевого экрана Cisco Firepower Threat Defense и программного обеспечения администрирования сети Cisco Firepower Management Center, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

5 Medium

CVSS2

5.3 Medium

CVSS3

Уязвимость CVE-2020-3315