Lucene search

K
nvd[email protected]NVD:CVE-2015-6321
HistoryNov 06, 2015 - 3:59 a.m.

CVE-2015-6321

2015-11-0603:59:03
CWE-399
web.nvd.nist.gov
5

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.6

Confidence

Low

EPSS

0.006

Percentile

77.8%

Cisco AsyncOS before 8.5.7-042, 9.x before 9.1.0-032, 9.1.x before 9.1.1-023, and 9.5.x and 9.6.x before 9.6.0-042 on Email Security Appliance (ESA) devices; before 9.1.0-032, 9.1.1 before 9.1.1-005, and 9.5.x before 9.5.0-025 on Content Security Management Appliance (SMA) devices; and before 7.7.0-725 and 8.x before 8.0.8-113 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via a flood of TCP packets, aka Bug IDs CSCus79774, CSCus79777, and CSCzv95795.

Affected configurations

Nvd
Node
ciscoweb_security_applianceMatch5.6.0-623
OR
ciscoweb_security_applianceMatch6.0.0-000
OR
ciscoweb_security_applianceMatch7.5.0-000
OR
ciscoweb_security_applianceMatch7.5.0-825
OR
ciscoweb_security_applianceMatch7.5.1-000
OR
ciscoweb_security_applianceMatch7.5.2-000
OR
ciscoweb_security_applianceMatch7.7.0-000
OR
ciscoweb_security_applianceMatch7.7.1-000
OR
ciscoweb_security_applianceMatch8.0.0-000
OR
ciscoweb_security_applianceMatch8.5.0.000
Node
ciscocontent_security_management_applianceMatch7.8.0-328
OR
ciscocontent_security_management_applianceMatch7.8.1-001
OR
ciscocontent_security_management_applianceMatch7.9.0-201
OR
ciscocontent_security_management_applianceMatch7.9.2-116
OR
ciscocontent_security_management_applianceMatch8.0.1-031
OR
ciscocontent_security_management_applianceMatch8.1.0-001
OR
ciscocontent_security_management_applianceMatch8.1.1-033
OR
ciscocontent_security_management_applianceMatch8.1.2-000
OR
ciscocontent_security_management_applianceMatch8.2.0-238
OR
ciscocontent_security_management_applianceMatch8.3.0-350
OR
ciscocontent_security_management_applianceMatch8.3.5-061
OR
ciscocontent_security_management_applianceMatch8.3.6-014
OR
ciscocontent_security_management_applianceMatch8.3.7-010
OR
ciscocontent_security_management_applianceMatch8.4.0-150
OR
ciscocontent_security_management_applianceMatch9.0.0-073
OR
ciscocontent_security_management_applianceMatch9.1.0-004
Node
ciscoemail_security_applianceMatch7.6.1-000
OR
ciscoemail_security_applianceMatch7.6.3-000
OR
ciscoemail_security_applianceMatch7.7.0-000
OR
ciscoemail_security_applianceMatch7.7.1-000
OR
ciscoemail_security_applianceMatch7.8.0-311
OR
ciscoemail_security_applianceMatch8.5.6-052
OR
ciscoemail_security_applianceMatch8.6.0-011
OR
ciscoemail_security_applianceMatch8.9.1-000
OR
ciscoemail_security_applianceMatch8.9.2-032
OR
ciscoemail_security_applianceMatch9.0.0-212
OR
ciscoemail_security_applianceMatch9.0.5-000
OR
ciscoemail_security_applianceMatch9.1.0-011
OR
ciscoemail_security_applianceMatch9.4.4-000
OR
ciscoemail_security_applianceMatch9.5.0-000
VendorProductVersionCPE
ciscoweb_security_appliance5.6.0-623cpe:2.3:a:cisco:web_security_appliance:5.6.0-623:*:*:*:*:*:*:*
ciscoweb_security_appliance6.0.0-000cpe:2.3:a:cisco:web_security_appliance:6.0.0-000:*:*:*:*:*:*:*
ciscoweb_security_appliance7.5.0-000cpe:2.3:a:cisco:web_security_appliance:7.5.0-000:*:*:*:*:*:*:*
ciscoweb_security_appliance7.5.0-825cpe:2.3:a:cisco:web_security_appliance:7.5.0-825:*:*:*:*:*:*:*
ciscoweb_security_appliance7.5.1-000cpe:2.3:a:cisco:web_security_appliance:7.5.1-000:*:*:*:*:*:*:*
ciscoweb_security_appliance7.5.2-000cpe:2.3:a:cisco:web_security_appliance:7.5.2-000:*:*:*:*:*:*:*
ciscoweb_security_appliance7.7.0-000cpe:2.3:a:cisco:web_security_appliance:7.7.0-000:*:*:*:*:*:*:*
ciscoweb_security_appliance7.7.1-000cpe:2.3:a:cisco:web_security_appliance:7.7.1-000:*:*:*:*:*:*:*
ciscoweb_security_appliance8.0.0-000cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*
ciscoweb_security_appliance8.5.0.000cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*
Rows per page:
1-10 of 401

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.6

Confidence

Low

EPSS

0.006

Percentile

77.8%

Related for NVD:CVE-2015-6321