ID CVE-2017-13677
Summary Denial-of-service (DoS) vulnerability in the Symantec Advanced Secure Gateway (ASG) and ProxySG management consoles. A remote attacker can use crafted HTTP/HTTPS requests to cause denial-of-service through management console application crashes.
References
Vulnerable Configurations
  • cpe:2.3:a:broadcom:advanced_secure_gateway:6.7:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:advanced_secure_gateway:6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:advanced_secure_gateway:6.7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:advanced_secure_gateway:6.7.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:advanced_secure_gateway:6.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:advanced_secure_gateway:6.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:advanced_secure_gateway:6.6:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:advanced_secure_gateway:6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:advanced_secure_gateway:6.6.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.6.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.6.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.7:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.7.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.7.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.7.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.9.14:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.9.14:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:symantec_proxysg:6.5.10.7:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:symantec_proxysg:6.5.10.7:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 24-06-2021 - 18:54)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 103685
confirm https://www.symantec.com/security-center/network-protection-security-advisories/SA162
sectrack 1040757
Last major update 24-06-2021 - 18:54
Published 11-04-2018 - 14:29
Last modified 24-06-2021 - 18:54
Back to Top