Lucene search

K
cveCiscoCVE-2016-1383
HistoryMay 25, 2016 - 1:59 a.m.

CVE-2016-1383

2016-05-2501:59:07
CWE-399
cisco
web.nvd.nist.gov
38
cve-2016-1383
cisco
asyncos
wsa
denial of service
memory leak
bug id cscur28305
nvd
security vulnerability

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.4

Confidence

High

EPSS

0.002

Percentile

55.5%

Memory leak in Cisco AsyncOS through 8.8 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via an unspecified HTTP status code, aka Bug ID CSCur28305.

Affected configurations

Nvd
Node
ciscoweb_security_applianceMatch-
AND
ciscoweb_security_appliance_\(wsa\)Match5.6.0-623
OR
ciscoweb_security_appliance_\(wsa\)Match6.0.0-000
OR
ciscoweb_security_appliance_\(wsa\)Match7.1.0
OR
ciscoweb_security_appliance_\(wsa\)Match7.1.1
OR
ciscoweb_security_appliance_\(wsa\)Match7.1.2
OR
ciscoweb_security_appliance_\(wsa\)Match7.1.3
OR
ciscoweb_security_appliance_\(wsa\)Match7.1.4
OR
ciscoweb_security_appliance_\(wsa\)Match7.5.0-000
OR
ciscoweb_security_appliance_\(wsa\)Match7.5.0-825
OR
ciscoweb_security_appliance_\(wsa\)Match7.5.1-000
OR
ciscoweb_security_appliance_\(wsa\)Match7.5.2-000
OR
ciscoweb_security_appliance_\(wsa\)Match7.7.0-000
OR
ciscoweb_security_appliance_\(wsa\)Match7.7.1-000
OR
ciscoweb_security_appliance_\(wsa\)Match8.0.0-000
OR
ciscoweb_security_appliance_\(wsa\)Match8.0.5
OR
ciscoweb_security_appliance_\(wsa\)Match8.0.6
OR
ciscoweb_security_appliance_\(wsa\)Match8.0.6-078
OR
ciscoweb_security_appliance_\(wsa\)Match8.0.6-119
OR
ciscoweb_security_appliance_\(wsa\)Match8.0.7
OR
ciscoweb_security_appliance_\(wsa\)Match8.0.7-142
OR
ciscoweb_security_appliance_\(wsa\)Match8.0.8-mr-113
OR
ciscoweb_security_appliance_\(wsa\)Match8.5.0-497
OR
ciscoweb_security_appliance_\(wsa\)Match8.5.0.000
OR
ciscoweb_security_appliance_\(wsa\)Match8.5.1-021
OR
ciscoweb_security_appliance_\(wsa\)Match8.5.2-024
OR
ciscoweb_security_appliance_\(wsa\)Match8.5.2-027
OR
ciscoweb_security_appliance_\(wsa\)Match8.5.3-055
VendorProductVersionCPE
ciscoweb_security_appliance-cpe:2.3:h:cisco:web_security_appliance:-:*:*:*:*:*:*:*
ciscoweb_security_appliance_\(wsa\)5.6.0-623cpe:2.3:a:cisco:web_security_appliance_\(wsa\):5.6.0-623:*:*:*:*:*:*:*
ciscoweb_security_appliance_\(wsa\)6.0.0-000cpe:2.3:a:cisco:web_security_appliance_\(wsa\):6.0.0-000:*:*:*:*:*:*:*
ciscoweb_security_appliance_\(wsa\)7.1.0cpe:2.3:a:cisco:web_security_appliance_\(wsa\):7.1.0:*:*:*:*:*:*:*
ciscoweb_security_appliance_\(wsa\)7.1.1cpe:2.3:a:cisco:web_security_appliance_\(wsa\):7.1.1:*:*:*:*:*:*:*
ciscoweb_security_appliance_\(wsa\)7.1.2cpe:2.3:a:cisco:web_security_appliance_\(wsa\):7.1.2:*:*:*:*:*:*:*
ciscoweb_security_appliance_\(wsa\)7.1.3cpe:2.3:a:cisco:web_security_appliance_\(wsa\):7.1.3:*:*:*:*:*:*:*
ciscoweb_security_appliance_\(wsa\)7.1.4cpe:2.3:a:cisco:web_security_appliance_\(wsa\):7.1.4:*:*:*:*:*:*:*
ciscoweb_security_appliance_\(wsa\)7.5.0-000cpe:2.3:a:cisco:web_security_appliance_\(wsa\):7.5.0-000:*:*:*:*:*:*:*
ciscoweb_security_appliance_\(wsa\)7.5.0-825cpe:2.3:a:cisco:web_security_appliance_\(wsa\):7.5.0-825:*:*:*:*:*:*:*
Rows per page:
1-10 of 281

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.4

Confidence

High

EPSS

0.002

Percentile

55.5%