Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-6607 (GCVE-0-2017-6607)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco ASA Software |
Version: Cisco ASA Software |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:33:20.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "97933", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97933" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" }, { "name": "1038319", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038319" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco ASA Software", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco ASA Software" } ] } ], "datePublic": "2017-04-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "97933", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97933" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" }, { "name": "1038319", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038319" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco ASA Software", "version": { "version_data": [ { "version_value": "Cisco ASA Software" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "97933", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97933" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" }, { "name": "1038319", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038319" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6607", "datePublished": "2017-04-20T22:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-08-05T15:33:20.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-6607\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2017-04-20T22:59:00.510\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el c\u00f3digo DNS de Cisco ASA Software podr\u00eda permitir a un atacante remoto no autenticado hacer que un dispositivo afectado recargue o corrompa la informaci\u00f3n presente en la cach\u00e9 DNS local del dispositivo. La vulnerabilidad se debe a una falla en el manejo de los mensajes de respuesta DNS. Un atacante podr\u00eda explotar esta vulnerabilidad al activar una solicitud DNS desde el software Cisco ASA y responder con una respuesta dise\u00f1ada. Una explotaci\u00f3n exitosa podr\u00eda provocar que el dispositivo se volviera a cargar, dando como resultado una denegaci\u00f3n de servicio (DoS) o corrupci\u00f3n de la informaci\u00f3n de cach\u00e9 DNS local. Nota: S\u00f3lo se puede utilizar el tr\u00e1fico dirigido al dispositivo afectado para explotar esta vulnerabilidad. Esta vulnerabilidad afecta al software Cisco ASA configurado en modo de firewall enrutado o transparente y en modo de contexto \u00fanico o m\u00faltiple. Esta vulnerabilidad puede ser provocada por el tr\u00e1fico IPv4 e IPv6. Esta vulnerabilidad afecta al Cisco ASA Software que se ejecuta en los siguientes productos: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Versiones fijas: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.8}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E1C03C-0737-4E2B-B3F9-10770281F4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7052D2-0789-4A4D-917D-FCD894B7280F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0956F0A8-7424-437C-AAD8-203183BEBFCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49FB57F9-5B37-4509-B2EB-6A16DFE11F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952F6504-9CD0-453E-8C25-02BB9EE818F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E842AF74-D1E3-4F71-80F9-197B38942405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6293A8-C21E-46F6-ACC1-6BBAD419B41F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1A48B1-112A-41C2-BC01-BCCF5794553D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AE7036-C8EE-441F-94A4-DE8A9E89CA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6448B4B4-022D-4D4A-A6DE-0090CEA12595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42813600-3186-4D19-8AF2-F4F98D3C6740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC0969E6-151D-4298-8EC8-68D7880E994B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0091CE-3386-4CCC-A2A8-900842EA6F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A450E0-09E4-44C5-B55C-78A4BDAADA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8285C95A-316D-4965-A34D-3BCB9AB83FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213F0A66-A71E-4B64-A66F-EA7B9C0D9151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D33B43A-1836-4402-AEAC-59CA8F44E3D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07BC9E2D-0B86-4A82-8CB4-A31FFBF322CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B7B477-15FD-4198-B0D9-0F9A8A2E4C20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6887033-E697-47D0-B6E0-61B64E9D3AC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C1AB6D-F2C5-4726-8792-581E8DCB9EB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(7\\\\)11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA1216C-903C-469D-8615-ECFB3AA29BC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4714F698-BBAE-47BB-99E8-F90D22415EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB55BC7E-0B3F-4202-8768-08F27B763926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB01683-C482-4A5B-90FA-B5266BEA452E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA16481A-4A47-4A8E-8C78-87B3A171280A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0258ED-6ED0-49C7-A13A-368711649FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D448BB56-5B2E-4B3E-B7E8-1F4991F23D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0346EAC-BDD1-4DC5-B8CA-20579C44AFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2049D602-54F1-4072-936E-0D7E337162B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0710D6C8-AD34-43E2-B72B-315FFF3DC34F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70F8F1D2-2196-44C4-B420-824F49BB4ACF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E14B8D3-6D53-4E84-9B5D-24667B192C4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05B2DFD-A0EF-42BE-B00B-334E78CA8C10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CC96C9-492F-49CB-BEFE-356581E96B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1F7D4-EC51-47D1-A71A-9EF98C51D388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5E93DE-06C0-401C-8062-1B2EB6EFDED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5EBFAB-25E2-4245-B748-92CAA943D4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BFB446-5747-42BB-98BC-B8DF250F1842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF48794-2E5D-4BE0-9BB5-49ADE34F4A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(0.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A13A9C-5387-4670-8E20-FE878946D091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(0.104\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F7C7DA3-C24B-41BB-BDBE-7DC58EEAC4F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\\\(3.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC39DA3-8171-4344-A946-7965873C56F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C31567-8AEB-49C6-AA60-4150411D62AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA140CB2-C17C-4164-A59A-8585906057BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"468D98A7-92D5-4C01-9EDD-CB44B85EA6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BAAC9FE-CCF0-4385-B5E9-FC424CD3EFD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9DEB1C-F9B9-4291-92B5-8EEEADC57E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39330218-32FA-42FF-B5CA-288B7D140304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92D7CED-D036-414B-B9EB-DCAF7F425A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AAAB02-140D-46F2-A315-5791BF5A853F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB02DBE-6D60-4D0E-8E9D-7611C3C32748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B4370A-84E5-4766-9D9D-EA1C53D73B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2F3C77-89CD-4990-98FA-E896079B6C87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D03293-9765-46DB-B53D-1B23D5C14373\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0286DAF0-FACA-4F94-82E9-EAED8750DB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E77826-1208-4582-A94C-242B601BD456\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD617A59-2A4C-4264-BB5D-0126EF292079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5B9FC85-13B8-488C-80C4-C29C0E244601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E7582A-835E-4A84-B197-EB40EE7985C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(1.50\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E044883-9952-477A-B2AA-3E0BB90C96A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(1.105\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E26A1B0-D61C-4A25-8E10-02A2E3E7A02B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(2.100\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4A28B7-87A2-464A-92A8-644E3F7D13D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\\\(2.243\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D83ED80-972A-4548-9AB0-10F9A23DF749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D99395-D18D-458E-9880-19B7767F69D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4CE047-3FEF-4A72-AD06-EC77D71EBCD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED33F68A-9EB0-416A-A0A5-0DF2C349FFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7DD812-DC72-4816-8B0F-361C32B2CD2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC41D4CD-D5EA-4678-B3AA-962C7C937118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"996C9552-5743-4639-A077-5B057605DF21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5779CE0-7691-47DA-902C-4D32D6650C9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C69BE69-7C19-4ED3-98D3-04B1D41E56FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7D12EFD-71D6-480E-97D5-278CCE4A7118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56AE55AB-8170-4E3A-AF89-A8F79599901A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B10653A-0E7C-4014-825D-76B5B438D378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77642A96-EF7F-4138-97BC-B3793EE0FB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFE9F46B-DD74-4295-BB6A-9239E29F4416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8F53875-D589-4C34-B863-67AC9945BED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8870EB6E-DAE9-45F9-BBA5-2D20E5E00F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B313B0E-4200-427F-A156-1EDA681F439D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C49821-3BA5-4B44-84F5-113024FD030F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2011F264-53A5-4507-843B-46F66D285ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"290AA0BD-EDB0-4BA4-BF85-9CF29A1B7908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73FB7BAF-7B3E-4091-A90B-FB19B38FFE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D2DA09B-CFBA-4FDE-A6D0-7C2CF202D72B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE2EE9B-D44E-430D-8469-1DF0ADC322B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC6B45EB-97BB-4683-9092-95E560B2585F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3AA854-0F4D-4B08-A249-B3C19C056D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66E55E46-01F5-4C0D-8A69-1BBC590188BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D96BCCA3-958D-41C4-98CE-1A333F9667A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"245E680B-7A2D-4F98-9D59-6ECF70FE882B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E29F95F5-6957-46F0-A0A2-CCACBBA14F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9EFD6D-A657-4102-982D-7634AC25E75E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59593836-990A-4CF1-AFBC-516C4A318641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5479676D-6B3F-4154-B0D4-D2C81E6C941F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F062A64B-7184-49C6-BDF5-8A413B0A85F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B574E7C0-95AA-4A24-9470-FA282192D85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F5B88C0-F809-4A58-9708-60C56129142C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0863F213-2EDF-4874-AFB3-E70B4B356BA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2780DD07-79B8-4096-A435-DB8FD6301E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2D8411-7317-4865-ADF9-279648210E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7AA7A9-F4DB-4BC1-9233-F72B66191F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D8C893-BA42-4EE5-A790-13614A6B436F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"339ACF13-0E1F-48D6-9939-96B16AE857CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D5D09C9-4559-4FED-B4B7-EAE5935EBCEE\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/97933\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038319\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/97933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038319\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
gsd-2017-6607
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-6607", "description": "A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898.", "id": "GSD-2017-6607" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-6607" ], "details": "A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898.", "id": "GSD-2017-6607", "modified": "2023-12-13T01:21:09.492548Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco ASA Software", "version": { "version_data": [ { "version_value": "Cisco ASA Software" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "97933", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97933" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" }, { "name": "1038319", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038319" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6607" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" }, { "name": "97933", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97933" }, { "name": "1038319", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1038319" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.8 } }, "lastModifiedDate": "2023-08-15T15:14Z", "publishedDate": "2017-04-20T22:59Z" } } }
fkie_cve-2017-6607
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/97933 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1038319 | ||
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97933 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038319 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
cisco | adaptive_security_appliance_software | 9.0.1 | |
cisco | adaptive_security_appliance_software | 9.0.2 | |
cisco | adaptive_security_appliance_software | 9.0.2.10 | |
cisco | adaptive_security_appliance_software | 9.0.3 | |
cisco | adaptive_security_appliance_software | 9.0.3.6 | |
cisco | adaptive_security_appliance_software | 9.0.3.8 | |
cisco | adaptive_security_appliance_software | 9.0.4 | |
cisco | adaptive_security_appliance_software | 9.0.4.1 | |
cisco | adaptive_security_appliance_software | 9.0.4.5 | |
cisco | adaptive_security_appliance_software | 9.0.4.7 | |
cisco | adaptive_security_appliance_software | 9.0.4.17 | |
cisco | adaptive_security_appliance_software | 9.0.4.20 | |
cisco | adaptive_security_appliance_software | 9.0.4.24 | |
cisco | adaptive_security_appliance_software | 9.0.4.26 | |
cisco | adaptive_security_appliance_software | 9.0.4.29 | |
cisco | adaptive_security_appliance_software | 9.0.4.33 | |
cisco | adaptive_security_appliance_software | 9.0.4.35 | |
cisco | adaptive_security_appliance_software | 9.0.4.37 | |
cisco | adaptive_security_appliance_software | 9.0.4.40 | |
cisco | adaptive_security_appliance_software | 9.0.4.42 | |
cisco | adaptive_security_appliance_software | 9.1\(7\)4 | |
cisco | adaptive_security_appliance_software | 9.1\(7\)6 | |
cisco | adaptive_security_appliance_software | 9.1\(7\)7 | |
cisco | adaptive_security_appliance_software | 9.1\(7\)9 | |
cisco | adaptive_security_appliance_software | 9.1\(7\)11 | |
cisco | adaptive_security_appliance_software | 9.1.1 | |
cisco | adaptive_security_appliance_software | 9.1.1.4 | |
cisco | adaptive_security_appliance_software | 9.1.2 | |
cisco | adaptive_security_appliance_software | 9.1.2.8 | |
cisco | adaptive_security_appliance_software | 9.1.3 | |
cisco | adaptive_security_appliance_software | 9.1.3.2 | |
cisco | adaptive_security_appliance_software | 9.1.4 | |
cisco | adaptive_security_appliance_software | 9.1.4.5 | |
cisco | adaptive_security_appliance_software | 9.1.5 | |
cisco | adaptive_security_appliance_software | 9.1.5.10 | |
cisco | adaptive_security_appliance_software | 9.1.5.12 | |
cisco | adaptive_security_appliance_software | 9.1.5.15 | |
cisco | adaptive_security_appliance_software | 9.1.5.21 | |
cisco | adaptive_security_appliance_software | 9.1.6 | |
cisco | adaptive_security_appliance_software | 9.1.6.1 | |
cisco | adaptive_security_appliance_software | 9.1.6.4 | |
cisco | adaptive_security_appliance_software | 9.1.6.6 | |
cisco | adaptive_security_appliance_software | 9.1.6.8 | |
cisco | adaptive_security_appliance_software | 9.1.6.10 | |
cisco | adaptive_security_appliance_software | 9.2\(0.0\) | |
cisco | adaptive_security_appliance_software | 9.2\(0.104\) | |
cisco | adaptive_security_appliance_software | 9.2\(3.1\) | |
cisco | adaptive_security_appliance_software | 9.2.1 | |
cisco | adaptive_security_appliance_software | 9.2.2 | |
cisco | adaptive_security_appliance_software | 9.2.2.4 | |
cisco | adaptive_security_appliance_software | 9.2.2.7 | |
cisco | adaptive_security_appliance_software | 9.2.2.8 | |
cisco | adaptive_security_appliance_software | 9.2.3 | |
cisco | adaptive_security_appliance_software | 9.2.3.3 | |
cisco | adaptive_security_appliance_software | 9.2.3.4 | |
cisco | adaptive_security_appliance_software | 9.2.4 | |
cisco | adaptive_security_appliance_software | 9.2.4.2 | |
cisco | adaptive_security_appliance_software | 9.2.4.4 | |
cisco | adaptive_security_appliance_software | 9.2.4.8 | |
cisco | adaptive_security_appliance_software | 9.2.4.10 | |
cisco | adaptive_security_appliance_software | 9.2.4.13 | |
cisco | adaptive_security_appliance_software | 9.2.4.14 | |
cisco | adaptive_security_appliance_software | 9.2.4.16 | |
cisco | adaptive_security_appliance_software | 9.2.4.17 | |
cisco | adaptive_security_appliance_software | 9.3\(1.50\) | |
cisco | adaptive_security_appliance_software | 9.3\(1.105\) | |
cisco | adaptive_security_appliance_software | 9.3\(2.100\) | |
cisco | adaptive_security_appliance_software | 9.3\(2.243\) | |
cisco | adaptive_security_appliance_software | 9.3.1 | |
cisco | adaptive_security_appliance_software | 9.3.1.1 | |
cisco | adaptive_security_appliance_software | 9.3.2 | |
cisco | adaptive_security_appliance_software | 9.3.2.2 | |
cisco | adaptive_security_appliance_software | 9.3.3 | |
cisco | adaptive_security_appliance_software | 9.3.3.1 | |
cisco | adaptive_security_appliance_software | 9.3.3.2 | |
cisco | adaptive_security_appliance_software | 9.3.3.5 | |
cisco | adaptive_security_appliance_software | 9.3.3.6 | |
cisco | adaptive_security_appliance_software | 9.3.3.9 | |
cisco | adaptive_security_appliance_software | 9.3.3.10 | |
cisco | adaptive_security_appliance_software | 9.3.3.11 | |
cisco | adaptive_security_appliance_software | 9.3.5 | |
cisco | adaptive_security_appliance_software | 9.4.0.115 | |
cisco | adaptive_security_appliance_software | 9.4.1 | |
cisco | adaptive_security_appliance_software | 9.4.1.1 | |
cisco | adaptive_security_appliance_software | 9.4.1.2 | |
cisco | adaptive_security_appliance_software | 9.4.1.3 | |
cisco | adaptive_security_appliance_software | 9.4.1.5 | |
cisco | adaptive_security_appliance_software | 9.4.2 | |
cisco | adaptive_security_appliance_software | 9.4.2.3 | |
cisco | adaptive_security_appliance_software | 9.4.3 | |
cisco | adaptive_security_appliance_software | 9.4.3.3 | |
cisco | adaptive_security_appliance_software | 9.4.3.4 | |
cisco | adaptive_security_appliance_software | 9.4.3.6 | |
cisco | adaptive_security_appliance_software | 9.4.3.8 | |
cisco | adaptive_security_appliance_software | 9.4.3.11 | |
cisco | adaptive_security_appliance_software | 9.5.1 | |
cisco | adaptive_security_appliance_software | 9.5.2 | |
cisco | adaptive_security_appliance_software | 9.5.2.6 | |
cisco | adaptive_security_appliance_software | 9.5.2.10 | |
cisco | adaptive_security_appliance_software | 9.5.2.14 | |
cisco | adaptive_security_appliance_software | 9.5.3 | |
cisco | adaptive_security_appliance_software | 9.5.3.1 | |
cisco | adaptive_security_appliance_software | 9.6.0 | |
cisco | adaptive_security_appliance_software | 9.6.1 | |
cisco | adaptive_security_appliance_software | 9.6.1.3 | |
cisco | adaptive_security_appliance_software | 9.6.1.5 | |
cisco | adaptive_security_appliance_software | 9.6.1.10 | |
cisco | adaptive_security_appliance_software | 9.6.2 | |
cisco | adaptive_security_appliance_software | 9.6.2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A6E1C03C-0737-4E2B-B3F9-10770281F4AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5C7052D2-0789-4A4D-917D-FCD894B7280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "0956F0A8-7424-437C-AAD8-203183BEBFCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "49FB57F9-5B37-4509-B2EB-6A16DFE11F03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "952F6504-9CD0-453E-8C25-02BB9EE818F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E842AF74-D1E3-4F71-80F9-197B38942405", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "3F6293A8-C21E-46F6-ACC1-6BBAD419B41F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "CC1A48B1-112A-41C2-BC01-BCCF5794553D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "D2AE7036-C8EE-441F-94A4-DE8A9E89CA8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "6448B4B4-022D-4D4A-A6DE-0090CEA12595", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "42813600-3186-4D19-8AF2-F4F98D3C6740", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "BC0969E6-151D-4298-8EC8-68D7880E994B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "4A0091CE-3386-4CCC-A2A8-900842EA6F51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "B5A450E0-09E4-44C5-B55C-78A4BDAADA45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "8285C95A-316D-4965-A34D-3BCB9AB83FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.40:*:*:*:*:*:*:*", "matchCriteriaId": "213F0A66-A71E-4B64-A66F-EA7B9C0D9151", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.42:*:*:*:*:*:*:*", "matchCriteriaId": "6D33B43A-1836-4402-AEAC-59CA8F44E3D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)4:*:*:*:*:*:*:*", "matchCriteriaId": "07BC9E2D-0B86-4A82-8CB4-A31FFBF322CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)6:*:*:*:*:*:*:*", "matchCriteriaId": "C9B7B477-15FD-4198-B0D9-0F9A8A2E4C20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)7:*:*:*:*:*:*:*", "matchCriteriaId": "C6887033-E697-47D0-B6E0-61B64E9D3AC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)9:*:*:*:*:*:*:*", "matchCriteriaId": "B4C1AB6D-F2C5-4726-8792-581E8DCB9EB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)11:*:*:*:*:*:*:*", "matchCriteriaId": "BEA1216C-903C-469D-8615-ECFB3AA29BC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4714F698-BBAE-47BB-99E8-F90D22415EDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB55BC7E-0B3F-4202-8768-08F27B763926", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFB01683-C482-4A5B-90FA-B5266BEA452E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "DA16481A-4A47-4A8E-8C78-87B3A171280A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8C0258ED-6ED0-49C7-A13A-368711649FFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D448BB56-5B2E-4B3E-B7E8-1F4991F23D81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "E0346EAC-BDD1-4DC5-B8CA-20579C44AFE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2049D602-54F1-4072-936E-0D7E337162B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "0710D6C8-AD34-43E2-B72B-315FFF3DC34F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "70F8F1D2-2196-44C4-B420-824F49BB4ACF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "5E14B8D3-6D53-4E84-9B5D-24667B192C4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "A05B2DFD-A0EF-42BE-B00B-334E78CA8C10", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F4CC96C9-492F-49CB-BEFE-356581E96B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "78F1F7D4-EC51-47D1-A71A-9EF98C51D388", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D5E93DE-06C0-401C-8062-1B2EB6EFDED6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "3E5EBFAB-25E2-4245-B748-92CAA943D4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B8BFB446-5747-42BB-98BC-B8DF250F1842", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "1EF48794-2E5D-4BE0-9BB5-49ADE34F4A82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "A3A13A9C-5387-4670-8E20-FE878946D091", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F7C7DA3-C24B-41BB-BDBE-7DC58EEAC4F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFC39DA3-8171-4344-A946-7965873C56F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F9C31567-8AEB-49C6-AA60-4150411D62AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CA140CB2-C17C-4164-A59A-8585906057BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "468D98A7-92D5-4C01-9EDD-CB44B85EA6BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7BAAC9FE-CCF0-4385-B5E9-FC424CD3EFD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "5C9DEB1C-F9B9-4291-92B5-8EEEADC57E51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "39330218-32FA-42FF-B5CA-288B7D140304", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92D7CED-D036-414B-B9EB-DCAF7F425A7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4AAAB02-140D-46F2-A315-5791BF5A853F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2EB02DBE-6D60-4D0E-8E9D-7611C3C32748", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "31B4370A-84E5-4766-9D9D-EA1C53D73B79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A2F3C77-89CD-4990-98FA-E896079B6C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "F5D03293-9765-46DB-B53D-1B23D5C14373", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "0286DAF0-FACA-4F94-82E9-EAED8750DB7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "25E77826-1208-4582-A94C-242B601BD456", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "DD617A59-2A4C-4264-BB5D-0126EF292079", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "F5B9FC85-13B8-488C-80C4-C29C0E244601", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "A2E7582A-835E-4A84-B197-EB40EE7985C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E044883-9952-477A-B2AA-3E0BB90C96A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E26A1B0-D61C-4A25-8E10-02A2E3E7A02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*", "matchCriteriaId": "6F4A28B7-87A2-464A-92A8-644E3F7D13D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D83ED80-972A-4548-9AB0-10F9A23DF749", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "26D99395-D18D-458E-9880-19B7767F69D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2E4CE047-3FEF-4A72-AD06-EC77D71EBCD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED33F68A-9EB0-416A-A0A5-0DF2C349FFEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F7DD812-DC72-4816-8B0F-361C32B2CD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "EC41D4CD-D5EA-4678-B3AA-962C7C937118", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "996C9552-5743-4639-A077-5B057605DF21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A5779CE0-7691-47DA-902C-4D32D6650C9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "0C69BE69-7C19-4ED3-98D3-04B1D41E56FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "E7D12EFD-71D6-480E-97D5-278CCE4A7118", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "56AE55AB-8170-4E3A-AF89-A8F79599901A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "8B10653A-0E7C-4014-825D-76B5B438D378", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "77642A96-EF7F-4138-97BC-B3793EE0FB52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "AFE9F46B-DD74-4295-BB6A-9239E29F4416", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*", "matchCriteriaId": "F8F53875-D589-4C34-B863-67AC9945BED8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8870EB6E-DAE9-45F9-BBA5-2D20E5E00F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B313B0E-4200-427F-A156-1EDA681F439D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B8C49821-3BA5-4B44-84F5-113024FD030F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2011F264-53A5-4507-843B-46F66D285ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "290AA0BD-EDB0-4BA4-BF85-9CF29A1B7908", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "73FB7BAF-7B3E-4091-A90B-FB19B38FFE74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D2DA09B-CFBA-4FDE-A6D0-7C2CF202D72B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "2BE2EE9B-D44E-430D-8469-1DF0ADC322B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BC6B45EB-97BB-4683-9092-95E560B2585F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "8D3AA854-0F4D-4B08-A249-B3C19C056D7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "66E55E46-01F5-4C0D-8A69-1BBC590188BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "D96BCCA3-958D-41C4-98CE-1A333F9667A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "245E680B-7A2D-4F98-9D59-6ECF70FE882B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E29F95F5-6957-46F0-A0A2-CCACBBA14F90", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "4D9EFD6D-A657-4102-982D-7634AC25E75E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "59593836-990A-4CF1-AFBC-516C4A318641", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "5479676D-6B3F-4154-B0D4-D2C81E6C941F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "F062A64B-7184-49C6-BDF5-8A413B0A85F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "B574E7C0-95AA-4A24-9470-FA282192D85C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F5B88C0-F809-4A58-9708-60C56129142C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0863F213-2EDF-4874-AFB3-E70B4B356BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2780DD07-79B8-4096-A435-DB8FD6301E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1F2D8411-7317-4865-ADF9-279648210E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E7AA7A9-F4DB-4BC1-9233-F72B66191F40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "03D8C893-BA42-4EE5-A790-13614A6B436F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "339ACF13-0E1F-48D6-9939-96B16AE857CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D5D09C9-4559-4FED-B4B7-EAE5935EBCEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898." }, { "lang": "es", "value": "Una vulnerabilidad en el c\u00f3digo DNS de Cisco ASA Software podr\u00eda permitir a un atacante remoto no autenticado hacer que un dispositivo afectado recargue o corrompa la informaci\u00f3n presente en la cach\u00e9 DNS local del dispositivo. La vulnerabilidad se debe a una falla en el manejo de los mensajes de respuesta DNS. Un atacante podr\u00eda explotar esta vulnerabilidad al activar una solicitud DNS desde el software Cisco ASA y responder con una respuesta dise\u00f1ada. Una explotaci\u00f3n exitosa podr\u00eda provocar que el dispositivo se volviera a cargar, dando como resultado una denegaci\u00f3n de servicio (DoS) o corrupci\u00f3n de la informaci\u00f3n de cach\u00e9 DNS local. Nota: S\u00f3lo se puede utilizar el tr\u00e1fico dirigido al dispositivo afectado para explotar esta vulnerabilidad. Esta vulnerabilidad afecta al software Cisco ASA configurado en modo de firewall enrutado o transparente y en modo de contexto \u00fanico o m\u00faltiple. Esta vulnerabilidad puede ser provocada por el tr\u00e1fico IPv4 e IPv6. Esta vulnerabilidad afecta al Cisco ASA Software que se ejecuta en los siguientes productos: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Versiones fijas: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898." } ], "id": "CVE-2017-6607", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-20T22:59:00.510", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97933" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1038319" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-47rj-rjcp-j4rj
Vulnerability from github
A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device's local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898.
{ "affected": [], "aliases": [ "CVE-2017-6607" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-04-20T22:59:00Z", "severity": "HIGH" }, "details": "A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898.", "id": "GHSA-47rj-rjcp-j4rj", "modified": "2022-05-13T01:46:41Z", "published": "2022-05-13T01:46:41Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6607" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/97933" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1038319" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H", "type": "CVSS_V3" } ] }
cnvd-2017-07137
Vulnerability from cnvd
用户可参考如下厂商提供的安全补丁以修复该漏洞: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns
Name | ['Cisco 7600 Series Routers', 'Cisco ASA 5500-X Series Next-Generation Firewalls', 'Cisco Adaptive Security Virtual Appliance (ASAv)', 'Cisco Firepower 9300 ASA Security Module', 'Cisco ISA 3000 Industrial Security Appliance', 'Cisco ASA 1000V Cloud Firewall', 'Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches', 'Cisco ASA 5500 Series Adaptive Security Appliances'] |
---|
{ "bids": { "bid": { "bidNumber": "97933" } }, "cves": { "cve": { "cveNumber": "CVE-2017-6607" } }, "description": "Cisco Adaptive Security Appliance (ASA) Software\u662fCisco ASA\u7cfb\u5217\u7684\u6838\u5fc3\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco ASA Software\u7684DNS\u4ee3\u7801\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u7531\u4e8e\u5904\u7406\u4e13\u95e8\u8bbe\u8ba1\u7684DNS\u54cd\u5e94\u6d88\u606f\u4e0a\u6709\u7f3a\u9677\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u53d7\u5f71\u54cd\u8bbe\u5907\u91cd\u65b0\u52a0\u8f7d\u6216\u7834\u574f\u8bbe\u5907\u672c\u5730DNS\u7f13\u5b58\u4e2d\u7684\u4fe1\u606f\u3002", "discovererName": "Cisco", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-07137", "openTime": "2017-05-22", "patchDescription": "Cisco Adaptive Security Appliance (ASA) Software\u662fCisco ASA\u7cfb\u5217\u7684\u6838\u5fc3\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco ASA Software\u7684DNS\u4ee3\u7801\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u7531\u4e8e\u5904\u7406\u4e13\u95e8\u8bbe\u8ba1\u7684DNS\u54cd\u5e94\u6d88\u606f\u4e0a\u6709\u7f3a\u9677\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u53d7\u5f71\u54cd\u8bbe\u5907\u91cd\u65b0\u52a0\u8f7d\u6216\u7834\u574f\u8bbe\u5907\u672c\u5730DNS\u7f13\u5b58\u4e2d\u7684\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Cisco ASA Software DNS\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Cisco 7600 Series Routers", "Cisco ASA 5500-X Series Next-Generation Firewalls", "Cisco Adaptive Security Virtual Appliance (ASAv)", "Cisco Firepower 9300 ASA Security Module", "Cisco ISA 3000 Industrial Security Appliance", "Cisco ASA 1000V Cloud Firewall", "Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches", "Cisco ASA 5500 Series Adaptive Security Appliances" ] }, "referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-6607\r\nhttp://www.securityfocus.com/bid/97933", "serverity": "\u4e2d", "submitTime": "2017-04-27", "title": "Cisco ASA Software DNS\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
CERTFR-2017-AVI-127
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Cisco. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | Adaptive Security Appliance | Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | Cisco ASA 5500 Series Adaptive Security Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
Cisco | Unified Communications Manager | Cisco Unified Communications Manager (CallManager) sans le dernier correctif de sécurité | ||
Cisco | N/A | Firepower 9300 Series Security Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | Adaptive Security Appliance | Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | Cisco ISA 3000 Industrial Security Appliance (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
Cisco | N/A | Sourcefire 3D System Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | Cisco Adaptive Security Virtual Appliance (ASAv, voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
Cisco | N/A | Cisco ASA 1000V Cloud Firewall (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
Cisco | N/A | Firepower 4100 Series Security Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | Cisco ASA Services Module pour les commutateurs Cisco Catalyst séries 6500 et les routeurs Cisco séries 7600 (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
Cisco | Firepower Threat Defense | FirePOWER Threat Defense for Integrated Services Routers (ISRs, voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | Industrial Security Appliance 3000 (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | FirePOWER 7000 Series Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | IOS XE | Cisco IOS et Cisco IOS XE avec le module EnergyWise activé, sans le dernier correctif de sécurité | ||
Cisco | N/A | FirePOWER 8000 Series Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
Cisco | N/A | Cisco Firepower 9300 ASA Security Module (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
Cisco | N/A | Cisco ASA 5500-X Series Next-Generation Firewalls (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "Adaptive Security Appliance", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5500 Series Adaptive Security Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unified Communications Manager (CallManager) sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Unified Communications Manager", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Firepower 9300 Series Security Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "Adaptive Security Appliance", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ISA 3000 Industrial Security Appliance (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Sourcefire 3D System Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Adaptive Security Virtual Appliance (ASAv, voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 1000V Cloud Firewall (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Firepower 4100 Series Security Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA Services Module pour les commutateurs Cisco Catalyst s\u00e9ries 6500 et les routeurs Cisco s\u00e9ries 7600 (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "FirePOWER Threat Defense for Integrated Services Routers (ISRs, voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "Firepower Threat Defense", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Industrial Security Appliance 3000 (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "FirePOWER 7000 Series Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS et Cisco IOS XE avec le module EnergyWise activ\u00e9, sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "IOS XE", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "FirePOWER 8000 Series Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Firepower 9300 ASA Security Module (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5500-X Series Next-Generation Firewalls (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2017-3862", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3862" }, { "name": "CVE-2017-3863", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3863" }, { "name": "CVE-2017-3861", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3861" }, { "name": "CVE-2017-6609", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6609" }, { "name": "CVE-2017-3808", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3808" }, { "name": "CVE-2016-6368", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6368" }, { "name": "CVE-2017-6608", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6608" }, { "name": "CVE-2017-6607", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6607" }, { "name": "CVE-2017-3860", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3860" }, { "name": "CVE-2017-6610", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6610" } ], "initial_release_date": "2017-04-20T00:00:00", "last_revision_date": "2017-04-20T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-xauth du 19 avril 2017", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-xauth" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-fpsnort du 19 avril 2017", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-ipsec du 19 avril 2017", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-ipsec" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-tls du 19 avril 2017", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-tls" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-dns du 19 avril 2017", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-energywise du 19 avril 2017", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-ucm du 19 avril 2017", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-ucm" } ], "reference": "CERTFR-2017-AVI-127", "revisions": [ { "description": "version initiale.", "revision_date": "2017-04-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Cisco\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-xauth du 19 avril 2017", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-ipsec du 19 avril 2017", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-dns du 19 avril 2017", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-energywise du 19 avril 2017", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-fpsnort du 19 avril 2017", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-ucm du 19 avril 2017", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-tls du 19 avril 2017", "url": null } ] }
var-201704-1344
Vulnerability from variot
A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device's local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898. Vendors have confirmed this vulnerability Bug ID CSCvb40898 It is released as.Tampering with information and disrupting service operations (DoS) An attack may be carried out. are all products of Cisco (Cisco). The platform provides features such as highly secure access to data and network resources
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-1344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "9.0.2.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "9.0.4.26" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.6.0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.6.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.2.4.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.5.2.14" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.3\\(2.100\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.4.37" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.2\\(0.104\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.3.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.2.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.4.20" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.4.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.3.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.3.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.3.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.4.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.4.24" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.4.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.4.3.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.4.29" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.3.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.2.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.2.2.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.1.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.5.21" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.4.17" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.3.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.2.3.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.6.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.0.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.4.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.3, "vendor": "cisco", "version": "9.1.2.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(1.50\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.4.14" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(2.243\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.3.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.42" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(0.0\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(7\\)9" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.5.15" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.4.17" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.1.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(7\\)7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.9" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.1.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.1.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.4.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.2.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2\\(3.1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.5.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.2.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.1.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.2.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.2.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.40" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.2.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.3.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.3.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.5.12" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.4.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.33" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.3.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.1.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.0.115" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(7\\)11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.4.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(7\\)6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.2.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3\\(1.105\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.4.16" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.3.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1.6.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.6.1.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.5.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.35" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.3.3.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.4.3.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.2.4.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1\\(7\\)4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1(7.12)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.2(4.18)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.4(3.12)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.5(3.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.6(2.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.50" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.4.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.4.3(8)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.51" }, { "model": "asa services module for cisco series routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "76000" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(3.9)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.546" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.49" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(4.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(0.104)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.7.26" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5(1.4)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3(2.42)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.312" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(6.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.64" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.418" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.32)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.30)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.55" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(1.8)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.3.19" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.13)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(3.10)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.31" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.39)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.16" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(3)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.14" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3(2.44)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.56" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x97.1(12.7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(3.4)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.56" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.217" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(7.13)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.15" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(1.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.231" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.812" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.54" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.14.20" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.423" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(2)8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(5.7)" }, { "model": "asa series adaptive security appliances", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "55000" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5(1.19)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.42)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.4(1.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5(3)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.2(4.18)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.14.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7(1.16)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.49" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.432" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.46" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.1.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.21" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.88" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.39" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(7.7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2.24" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(3.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.512" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.26)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x100.15(0.136)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.1.4.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6.1.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5(1.18)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.6(2.99)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.4(2.4)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2.4.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.33)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.1.14" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.3)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5(2.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.55" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(5.106)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.7.15" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(1.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.3.12" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.223" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.19" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.11)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.5(3.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.15)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6(1.3)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5(1.21)" }, { "model": "asa cloud firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.2.12" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.531" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2.4(14)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.7.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.214" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.14.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.24" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6.1.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.316" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.29" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.225" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.12" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.722" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "100.13(20.3)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.13.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.1.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.2)2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.1.14" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(4.5)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(1.7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.9)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(2.8)" }, { "model": "asa series firewalls", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.4(4)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.428" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.218" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.222" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6.1.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.5" }, { "model": "asa services module for cisco catalyst series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "65000" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.1.4.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.61" }, { "model": "firepower asa security module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "93000" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.7(1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.216" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.16" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.4(3.99)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.540" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2.(3.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(4.3)" }, { "model": "asa series firewalls", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.1(7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.56" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.1.4.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(6.9)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6.1.1" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.1(7.12)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.0.45" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.431" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2(2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.513" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.425" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3.3(10)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x97.1(0.50)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.18" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(1.105)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x97.1(6.28)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(3.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.237" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.24" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.19" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.8)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.219" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.523" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.433" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2(5.57)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.43" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7(1.11)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.7(9)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.6(3)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.82" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.13.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.14.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.1.3.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.11.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.526" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6.114" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(3.7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.71" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5(2.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.1.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.510" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6(1.12)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.813" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.45" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.416" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(2.4)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(2.100)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.52" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.124" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.632" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.28" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.41" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(5.15)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(3.4)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(5.12)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7(1.4)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(2.5)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6(2.10)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.4(3.12)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.7(0.99)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(6.5)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.1.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.19" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.1.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2(5.47)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6(1.13)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(4.13)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.515" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.21)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6.1.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(2.10)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.1.17" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.45" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.23" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.233" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "100.12(21.9)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(0.0)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.528" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.23)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.2.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.34" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.41" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.15" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.12.10" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.2.41" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.49" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.4(3.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.44" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.14" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7(1.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.1.18" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2(5.51)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.622" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.50" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.3.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.433" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(3.11)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.618" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.74" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(3.8)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.1.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.26" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.425" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(6.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.4.(0.115)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.12.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(2.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.2.15" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3.3.8" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(5.16)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(3.3)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(3.8)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.58" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(5.7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6(1.5)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.12" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.21" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.512" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.119" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(3)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.15" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "100.13(0.21)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x100.13(0.149)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.4(40)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(1.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.4(2.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.1.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.213" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.522" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(4.8)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.14.24" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.28)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6(1.15)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(5.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.23" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2(5.44)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.24" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.520" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.210" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.1.11" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(2.243)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.14.17" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.7.23" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5(1.24)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.29)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.2.40" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.510" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "100.14(1.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6.1.12" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5.1" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x100.8(40.129)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.527" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.57" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.113" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(5.12)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2.27" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.541" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.119" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6.1(11)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.16" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.2.49" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3(2.39)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.68" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(1.4)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(1.50)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.210" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2(5.48)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.31" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.626" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.2.39" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6(1.17)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x96.2(0.94)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.3(3)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.3" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.4(4)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.2.13" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.512" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(3.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6(1.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.13.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(4.38)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.548" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.525" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.4.2.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2(5.46)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.1.7" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.6(1.14)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2(4.8)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.14" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.4(2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7(1.7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(6.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.712" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.79" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.2(4.5)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.1.4" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x9.6(2.2)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.49" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(5.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.430" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7(1.8)2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.1.1.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.427" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.3" }, { "model": "isa industrial security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7(1.18)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7.5)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3.234" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.14" }, { "model": "asa series next-generation firewalls", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5500-x0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0.14.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4(7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.2.533" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1(7.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.7.31" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(3.1)" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x97.1(11.1)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.4.38" }, { "model": "adaptive security virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.629" }, { "model": "asa series firewalls", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5500-x100.11(0.75)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7.113" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.234" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0(2.6)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.3(2.40)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.42" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1.1.3.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.7(1.13)" } ], "sources": [ { "db": "BID", "id": "97933" }, { "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "db": "CNNVD", "id": "CNNVD-201704-1064" }, { "db": "NVD", "id": "CVE-2017-6607" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:adaptive_security_appliance_software", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003233" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "97933" } ], "trust": 0.3 }, "cve": "CVE-2017-6607", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2017-6607", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-114810", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2017-6607", "impactScore": 5.8, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-6607", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-6607", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201704-1064", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-114810", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-114810" }, { "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "db": "CNNVD", "id": "CNNVD-201704-1064" }, { "db": "NVD", "id": "CVE-2017-6607" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the DNS code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause an affected device to reload or corrupt the information present in the device\u0027s local DNS cache. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by triggering a DNS request from the Cisco ASA Software and replying with a crafted response. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information. Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco Firepower 9300 ASA Security Module, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.12) 9.2(4.18) 9.4(3.12) 9.5(3.2) 9.6(2.2). Cisco Bug IDs: CSCvb40898. Vendors have confirmed this vulnerability Bug ID CSCvb40898 It is released as.Tampering with information and disrupting service operations (DoS) An attack may be carried out. are all products of Cisco (Cisco). The platform provides features such as highly secure access to data and network resources", "sources": [ { "db": "NVD", "id": "CVE-2017-6607" }, { "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "db": "BID", "id": "97933" }, { "db": "VULHUB", "id": "VHN-114810" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6607", "trust": 2.8 }, { "db": "BID", "id": "97933", "trust": 2.0 }, { "db": "SECTRACK", "id": "1038319", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-003233", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201704-1064", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-114810", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114810" }, { "db": "BID", "id": "97933" }, { "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "db": "CNNVD", "id": "CNNVD-201704-1064" }, { "db": "NVD", "id": "CVE-2017-6607" } ] }, "id": "VAR-201704-1344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-114810" } ], "trust": 0.7122863666666666 }, "last_update_date": "2024-11-23T22:30:48.649000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170419-asa-dns", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns" }, { "title": "Multiple Cisco product ASA Software Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70700" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "db": "CNNVD", "id": "CNNVD-201704-1064" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114810" }, { "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "db": "NVD", "id": "CVE-2017-6607" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170419-asa-dns" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/97933" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038319" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6607" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6607" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-114810" }, { "db": "BID", "id": "97933" }, { "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "db": "CNNVD", "id": "CNNVD-201704-1064" }, { "db": "NVD", "id": "CVE-2017-6607" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-114810" }, { "db": "BID", "id": "97933" }, { "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "db": "CNNVD", "id": "CNNVD-201704-1064" }, { "db": "NVD", "id": "CVE-2017-6607" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-20T00:00:00", "db": "VULHUB", "id": "VHN-114810" }, { "date": "2017-04-19T00:00:00", "db": "BID", "id": "97933" }, { "date": "2017-05-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "date": "2017-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-1064" }, { "date": "2017-04-20T22:59:00.510000", "db": "NVD", "id": "CVE-2017-6607" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-114810" }, { "date": "2017-05-02T01:07:00", "db": "BID", "id": "97933" }, { "date": "2017-05-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003233" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-1064" }, { "date": "2024-11-21T03:30:06.503000", "db": "NVD", "id": "CVE-2017-6607" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-1064" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Adaptive Security Appliance Software DNS Resource management vulnerability in code", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003233" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-1064" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.