cnvd-2018-15418
Vulnerability from cnvd
Title
Cisco Web Security Appliance Web Proxy内存耗尽拒绝服务漏洞
Description
Cisco Web Security Appliance(WSA)是美国思科(Cisco)公司的一套Web安全设备。该设备提供基于SaaS的访问控制、实时网络报告和追踪、制定安全策略等功能。 Cisco Web Security Appliance Web Proxy存在内存耗尽拒绝服务漏洞,该漏洞源于受影响的软件未能正确管理与目标设备的TCP连接的内存资源。 攻击者可以通过IPv4或IPv6建立与受影响设备的数据接口的大量TCP连接来利用此漏洞。 成功利用可能允许攻击者耗尽系统内存,可能导致系统停止处理新连接并导致DoS条件。
Severity
Patch Name
Cisco Web Security Appliance Web Proxy内存耗尽拒绝服务漏洞的补丁
Patch Description
Cisco Web Security Appliance(WSA)是美国思科(Cisco)公司的一套Web安全设备。该设备提供基于SaaS的访问控制、实时网络报告和追踪、制定安全策略等功能。 Cisco Web Security Appliance Web Proxy存在内存耗尽拒绝服务漏洞,该漏洞源于受影响的软件未能正确管理与目标设备的TCP连接的内存资源。 攻击者可以通过IPv4或IPv6建立与受影响设备的数据接口的大量TCP连接来利用此漏洞。 成功利用可能允许攻击者耗尽系统内存,可能导致系统停止处理新连接并导致DoS条件。 目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

思科发布了解决此漏洞的软件更新,用户可联系供应商获得更新信息: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-wsa-dos

Reference
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-wsa-dos
Impacted products
Name
['Cisco AsyncOS Software(for Cisco Web Security Appliances) 9.1', 'Cisco AsyncOS Software(for Cisco Web Security Appliances) 10.1', 'Cisco AsyncOS Software(for Cisco Web Security Appliances) 10.5', 'Cisco AsyncOS Software(for Cisco Web Security Appliances) 11.0']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-0410"
    }
  },
  "description": "Cisco Web Security Appliance\uff08WSA\uff09\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957Web\u5b89\u5168\u8bbe\u5907\u3002\u8be5\u8bbe\u5907\u63d0\u4f9b\u57fa\u4e8eSaaS\u7684\u8bbf\u95ee\u63a7\u5236\u3001\u5b9e\u65f6\u7f51\u7edc\u62a5\u544a\u548c\u8ffd\u8e2a\u3001\u5236\u5b9a\u5b89\u5168\u7b56\u7565\u7b49\u529f\u80fd\u3002\r\n\r\nCisco Web Security Appliance Web Proxy\u5b58\u5728\u5185\u5b58\u8017\u5c3d\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u8f6f\u4ef6\u672a\u80fd\u6b63\u786e\u7ba1\u7406\u4e0e\u76ee\u6807\u8bbe\u5907\u7684TCP\u8fde\u63a5\u7684\u5185\u5b58\u8d44\u6e90\u3002 \u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7IPv4\u6216IPv6\u5efa\u7acb\u4e0e\u53d7\u5f71\u54cd\u8bbe\u5907\u7684\u6570\u636e\u63a5\u53e3\u7684\u5927\u91cfTCP\u8fde\u63a5\u6765\u5229\u7528\u6b64\u6f0f\u6d1e\u3002 \u6210\u529f\u5229\u7528\u53ef\u80fd\u5141\u8bb8\u653b\u51fb\u8005\u8017\u5c3d\u7cfb\u7edf\u5185\u5b58\uff0c\u53ef\u80fd\u5bfc\u81f4\u7cfb\u7edf\u505c\u6b62\u5904\u7406\u65b0\u8fde\u63a5\u5e76\u5bfc\u81f4DoS\u6761\u4ef6\u3002",
  "discovererName": "Cisco",
  "formalWay": "\u601d\u79d1\u53d1\u5e03\u4e86\u89e3\u51b3\u6b64\u6f0f\u6d1e\u7684\u8f6f\u4ef6\u66f4\u65b0\uff0c\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u66f4\u65b0\u4fe1\u606f\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-wsa-dos",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-15418",
  "openTime": "2018-08-16",
  "patchDescription": "Cisco Web Security Appliance\uff08WSA\uff09\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957Web\u5b89\u5168\u8bbe\u5907\u3002\u8be5\u8bbe\u5907\u63d0\u4f9b\u57fa\u4e8eSaaS\u7684\u8bbf\u95ee\u63a7\u5236\u3001\u5b9e\u65f6\u7f51\u7edc\u62a5\u544a\u548c\u8ffd\u8e2a\u3001\u5236\u5b9a\u5b89\u5168\u7b56\u7565\u7b49\u529f\u80fd\u3002\r\n\r\nCisco Web Security Appliance Web Proxy\u5b58\u5728\u5185\u5b58\u8017\u5c3d\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u53d7\u5f71\u54cd\u7684\u8f6f\u4ef6\u672a\u80fd\u6b63\u786e\u7ba1\u7406\u4e0e\u76ee\u6807\u8bbe\u5907\u7684TCP\u8fde\u63a5\u7684\u5185\u5b58\u8d44\u6e90\u3002 \u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7IPv4\u6216IPv6\u5efa\u7acb\u4e0e\u53d7\u5f71\u54cd\u8bbe\u5907\u7684\u6570\u636e\u63a5\u53e3\u7684\u5927\u91cfTCP\u8fde\u63a5\u6765\u5229\u7528\u6b64\u6f0f\u6d1e\u3002 \u6210\u529f\u5229\u7528\u53ef\u80fd\u5141\u8bb8\u653b\u51fb\u8005\u8017\u5c3d\u7cfb\u7edf\u5185\u5b58\uff0c\u53ef\u80fd\u5bfc\u81f4\u7cfb\u7edf\u505c\u6b62\u5904\u7406\u65b0\u8fde\u63a5\u5e76\u5bfc\u81f4DoS\u6761\u4ef6\u3002 \u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Cisco Web Security Appliance Web Proxy\u5185\u5b58\u8017\u5c3d\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Cisco AsyncOS Software(for Cisco Web Security Appliances) 9.1",
      "Cisco AsyncOS Software(for Cisco Web Security Appliances) 10.1",
      "Cisco AsyncOS Software(for Cisco Web Security Appliances) 10.5",
      "Cisco AsyncOS Software(for Cisco Web Security Appliances) 11.0"
    ]
  },
  "referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-wsa-dos",
  "serverity": "\u4e2d",
  "submitTime": "2018-08-16",
  "title": "Cisco Web Security Appliance Web Proxy\u5185\u5b58\u8017\u5c3d\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…