fkie_cve-2016-1385
Vulnerability from fkie_nvd
Published
2016-05-26 15:59
Modified
2024-11-21 02:46
Severity ?
Summary
The XML parser in Cisco Adaptive Security Appliance (ASA) Software through 9.5.2 allows remote authenticated users to cause a denial of service (instability, memory consumption, or device reload) by leveraging (1) administrative access or (2) Clientless SSL VPN access to provide a crafted XML document, aka Bug ID CSCut14209.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA1C5485-EAF4-4F4D-AFA1-E105F433665E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "989F9AC4-C2D1-49A0-95C3-79A4EB827E07", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "BFE2E079-D7AC-4FE9-8938-A75C12AF5CA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "B442C852-2465-4EA8-A977-1F10A4CE23AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "C6DB6ED4-3095-46C1-9CB6-2975A7B05303", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE68CD8E-B9CF-4519-8B0E-4C4488B34887", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "D762C9A7-005C-44FD-9BB2-7A1DD4EBE90B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "EE0B1212-87F3-46E5-B14A-C0C6BBAAAC98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "518D4826-06B0-4DDC-B082-A536418FD292", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "E343DE08-58FA-4C39-99F9-8CB5F57D0CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "76363698-DB62-4D92-8EE4-069891A9F92C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6159BEE3-D097-4E07-9962-06DB740E2AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD606591-F69A-47AD-9256-20B98CA16135", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4EF3895-F372-45D3-9C7D-15F5C4712D08", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "4DC5960D-B917-4ABA-850F-A710676ACB40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "B746A138-6650-49A3-87C8-3728FE5CF215", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "E50C2A13-5A8B-4FA5-ABB8-1157E560503B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "909F9D55-9276-4CF1-BC63-7CEEF8F25C21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "F383D276-D5EC-4335-AC09-9D30F6443AF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "39C2A7FF-6AC3-42B5-954A-9AA5950C523A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "9D7F36A8-C291-423D-AF28-56AAD8D0F712", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*", "matchCriteriaId": "3C2009F4-F832-49D6-8346-54A7328BD93B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.23:*:*:*:*:*:*:*", "matchCriteriaId": "C9221DD4-498A-4867-B647-47E42299CE45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.26:*:*:*:*:*:*:*", "matchCriteriaId": "B839A425-E08C-41B1-9270-E177E40B1E27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.28:*:*:*:*:*:*:*", "matchCriteriaId": "8F4DDF53-0995-4971-A980-30FD15A40C78", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.29:*:*:*:*:*:*:*", "matchCriteriaId": "2F3BD921-A58A-47EB-B90D-21C3A5D02D40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "800FE449-350D-4C4C-A8C2-D4C5A3B59F36", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C49BF8F7-5ACE-4D90-8F17-1AA9D3A2FD7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "8CE6D050-F186-492C-9813-895433B2612A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "6157AA5C-8297-4A32-B0A8-1E7E801E9CD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "F5A13091-02C6-4D98-90C9-ED4C43BDAFAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "F2C3E0E1-C3F3-4D53-8116-7D1AF3CD53CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "59F3DB48-E1EE-44E9-85DE-9FD7D5C59B4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "27E064BD-CBC0-4556-9BCF-87D808809237", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "63D5DC14-187B-4808-8377-5FF44A11AA3E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64079FC4-53D8-4DBF-A2D5-2CED256F4939", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FF969BE-46BB-4AD7-85AB-8384426E9551", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8EEA7A5-67FD-4CA4-8FF8-4B17A9C47B61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "94E618B3-DD03-4ECD-AB9B-97F1EDF95E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "0D0DFE19-1C68-40E6-B8CD-9CC03F8B4281", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "20424324-881A-496B-BC55-62AA75994249", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "D67012F3-5153-400E-BD6F-EB0949875F2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "E40E9AB5-26E0-4BA2-9AFA-496BAA0EAC77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "A6BA4B2D-187A-47EC-8BE1-7EA178549476", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "3CF52FB9-4EA9-41A7-AD29-E963C09FC98C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "04C8C6E9-D5C3-42DC-B431-9097B2FCCB52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "75B5CF41-7F01-4AE9-B54B-8DB6909504B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F3BDD9D1-0DE3-4FA7-BDC1-2A724162CEEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7C80EAFF-E577-414A-9DDE-D27A41CB3DC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "26CC07CC-0C79-48ED-BEB6-4B576A0DBD68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "83FA6817-C5B7-410F-9CF7-801CC958C12E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "1576FC7F-B7DD-41DD-A95E-23B1F86E4B02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "3768E4B0-E457-47AB-99B0-7C1A0E0CBE35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "5D142088-0265-4987-8F5C-029F3DD06A18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "76EDEE39-865D-4DA3-B1C9-033F2FF1A56F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "500ED3CC-4FE8-4A24-ACFE-8D7E35E50D22", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "BD2AE76B-D04E-4D0C-85E4-8AD07F7BDEDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A6E1C03C-0737-4E2B-B3F9-10770281F4AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5C7052D2-0789-4A4D-917D-FCD894B7280F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "0956F0A8-7424-437C-AAD8-203183BEBFCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "49FB57F9-5B37-4509-B2EB-6A16DFE11F03", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "952F6504-9CD0-453E-8C25-02BB9EE818F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E842AF74-D1E3-4F71-80F9-197B38942405", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "A0B97FB1-CC3A-40B5-853D-476E6C5D9D6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "3F6293A8-C21E-46F6-ACC1-6BBAD419B41F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "CC1A48B1-112A-41C2-BC01-BCCF5794553D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "D2AE7036-C8EE-441F-94A4-DE8A9E89CA8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*", "matchCriteriaId": "6448B4B4-022D-4D4A-A6DE-0090CEA12595", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*", "matchCriteriaId": "42813600-3186-4D19-8AF2-F4F98D3C6740", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*", "matchCriteriaId": "BC0969E6-151D-4298-8EC8-68D7880E994B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*", "matchCriteriaId": "4A0091CE-3386-4CCC-A2A8-900842EA6F51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*", "matchCriteriaId": "B5A450E0-09E4-44C5-B55C-78A4BDAADA45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "8285C95A-316D-4965-A34D-3BCB9AB83FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4714F698-BBAE-47BB-99E8-F90D22415EDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB55BC7E-0B3F-4202-8768-08F27B763926", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFB01683-C482-4A5B-90FA-B5266BEA452E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "DA16481A-4A47-4A8E-8C78-87B3A171280A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "8C0258ED-6ED0-49C7-A13A-368711649FFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "1B7A71AA-E1A6-47B7-B2B2-A3115CAA4058", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D448BB56-5B2E-4B3E-B7E8-1F4991F23D81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "E0346EAC-BDD1-4DC5-B8CA-20579C44AFE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2049D602-54F1-4072-936E-0D7E337162B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "0710D6C8-AD34-43E2-B72B-315FFF3DC34F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "70F8F1D2-2196-44C4-B420-824F49BB4ACF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "5E14B8D3-6D53-4E84-9B5D-24667B192C4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "A05B2DFD-A0EF-42BE-B00B-334E78CA8C10", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F4CC96C9-492F-49CB-BEFE-356581E96B3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "78F1F7D4-EC51-47D1-A71A-9EF98C51D388", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D5E93DE-06C0-401C-8062-1B2EB6EFDED6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "3E5EBFAB-25E2-4245-B748-92CAA943D4C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "B8BFB446-5747-42BB-98BC-B8DF250F1842", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "1EF48794-2E5D-4BE0-9BB5-49ADE34F4A82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*", "matchCriteriaId": "A3A13A9C-5387-4670-8E20-FE878946D091", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F7C7DA3-C24B-41BB-BDBE-7DC58EEAC4F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFC39DA3-8171-4344-A946-7965873C56F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "F9C31567-8AEB-49C6-AA60-4150411D62AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CA140CB2-C17C-4164-A59A-8585906057BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "468D98A7-92D5-4C01-9EDD-CB44B85EA6BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "7BAAC9FE-CCF0-4385-B5E9-FC424CD3EFD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "5C9DEB1C-F9B9-4291-92B5-8EEEADC57E51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "39330218-32FA-42FF-B5CA-288B7D140304", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92D7CED-D036-414B-B9EB-DCAF7F425A7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4AAAB02-140D-46F2-A315-5791BF5A853F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "2EB02DBE-6D60-4D0E-8E9D-7611C3C32748", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "31B4370A-84E5-4766-9D9D-EA1C53D73B79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A2F3C77-89CD-4990-98FA-E896079B6C87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E044883-9952-477A-B2AA-3E0BB90C96A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E26A1B0-D61C-4A25-8E10-02A2E3E7A02B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*", "matchCriteriaId": "6F4A28B7-87A2-464A-92A8-644E3F7D13D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D83ED80-972A-4548-9AB0-10F9A23DF749", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "26D99395-D18D-458E-9880-19B7767F69D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2E4CE047-3FEF-4A72-AD06-EC77D71EBCD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "ED33F68A-9EB0-416A-A0A5-0DF2C349FFEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F7DD812-DC72-4816-8B0F-361C32B2CD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "EC41D4CD-D5EA-4678-B3AA-962C7C937118", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "996C9552-5743-4639-A077-5B057605DF21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A5779CE0-7691-47DA-902C-4D32D6650C9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "0C69BE69-7C19-4ED3-98D3-04B1D41E56FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "E7D12EFD-71D6-480E-97D5-278CCE4A7118", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "AFE9F46B-DD74-4295-BB6A-9239E29F4416", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*", "matchCriteriaId": "F8F53875-D589-4C34-B863-67AC9945BED8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8870EB6E-DAE9-45F9-BBA5-2D20E5E00F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B313B0E-4200-427F-A156-1EDA681F439D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B8C49821-3BA5-4B44-84F5-113024FD030F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2011F264-53A5-4507-843B-46F66D285ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "290AA0BD-EDB0-4BA4-BF85-9CF29A1B7908", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "73FB7BAF-7B3E-4091-A90B-FB19B38FFE74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D2DA09B-CFBA-4FDE-A6D0-7C2CF202D72B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E29F95F5-6957-46F0-A0A2-CCACBBA14F90", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "4D9EFD6D-A657-4102-982D-7634AC25E75E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D80DB80-F243-469B-993F-E368B092B3C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XML parser in Cisco Adaptive Security Appliance (ASA) Software through 9.5.2 allows remote authenticated users to cause a denial of service (instability, memory consumption, or device reload) by leveraging (1) administrative access or (2) Clientless SSL VPN access to provide a crafted XML document, aka Bug ID CSCut14209." }, { "lang": "es", "value": "Vulnerabilidad en el int\u00e9rprete XML en Cisco Adaptive Security Appliance (ASA) Software hasta la versi\u00f3n 9.5.2 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (inestabilidad, consumo de memoria o recarga de dispositivo) mediante el aprovechamiento de (1) acceso administrativo o (2) acceso VPN Clientless SSL para proporcionar un documento XML manipulado, tambi\u00e9n conocida como Bug ID CSCut14209." } ], "id": "CVE-2016-1385", "lastModified": "2024-11-21T02:46:20.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-26T15:59:01.463", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-asa-xml" }, { "source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1035976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-asa-xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035976" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.