var-201608-0222
Vulnerability from variot
Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON. Bug ID CSCva92151 or EXTRABACON It is published as.A remote authenticated user may be able to exploit IPv4 SNMP Arbitrary code may be executed via packets. The CiscoASA5500 Series Adaptive Security Appliance is a modular platform for providing security and VPN services with firewall, IPS, anti-X and VPN services. A remote code execution vulnerability exists in the SNMP code for CiscoAdaptiveSecurityAppliance(ASA)Software. Cisco Adaptive Security Appliance products are prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. This issue being tracked by Cisco Bug ID CSCva92151
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201608-0222", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "9.3.3\\(10\\)" }, { "model": "pix firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "9.4.3\\(8\\)" }, { "model": "adaptive security appliance software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "9.5\\(3\\)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "9.2.4\\(14\\)" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "7.2.1" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "9.3.0" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "9.1.7\\(9\\)" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "9.4.0.115" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "9.1.1" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "9.0.4.40" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "9.6.1\\(11\\)" }, { "model": "asa 1000v cloud firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1.1" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "9.6.0" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "9.2.0" }, { "model": "asa 1000v cloud firewall software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.7.1" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "9.5.0" }, { "model": "cisco asa 1000v \u30af\u30e9\u30a6\u30c9 \u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco firepower services for asa", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco firepower threat defense \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco pix firewall \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco adaptive security appliance \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "firewall services module", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "asa series next-generation firewalls", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5500-x" }, { "model": "adaptive security virtual appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "firepower asa security module", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9300" }, { "model": "pix firewalls", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "industrial security appliance", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3000" }, { "model": "firepower threat defense software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "firepower series", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4100" }, { "model": "asa cloud firewall", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000v" }, { "model": "asa services module for cisco series routers", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7600" }, { "model": "asa services module for cisco catalyst series switches", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6500" }, { "model": "asa series adaptive security appliances", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5500" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "8.5.1.19" }, { "model": "firepower services software for asa", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.4.1.1" }, { "model": "firepower services software for asa", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.4.0" }, { "model": "firepower services software for asa", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.4.1.7" }, { "model": "firepower services software for asa", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.4.1.4" }, { "model": "firepower services software for asa", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.4.1.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.0.7.9" }, { "model": "firepower services software for asa", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.4.1.3" }, { "model": "firepower services software for asa", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.4.1.6" }, { "model": "firepower services software for asa", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.4.1.5" }, { "model": "pix firewalls", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "firepower asa security module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "93000" }, { "model": "asa services module for cisco catalyst series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "65000" }, { "model": "asa series next-generation firewalls", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5500-x0" }, { "model": "asa series adaptive security appliances", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "55000" }, { "model": "asa cloud firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v0" }, { "model": "adaptive security virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "series routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "76000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06432" }, { "db": "BID", "id": "92521" }, { "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "db": "CNNVD", "id": "CNNVD-201608-012" }, { "db": "NVD", "id": "CVE-2016-6366" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Shadow Brokers group", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-012" } ], "trust": 0.6 }, "cve": "CVE-2016-6366", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "CVE-2016-6366", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2016-06432", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "VHN-95186", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2016-6366", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-6366", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-6366", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-6366", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-06432", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201608-012", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-95186", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-6366", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06432" }, { "db": "VULHUB", "id": "VHN-95186" }, { "db": "VULMON", "id": "CVE-2016-6366" }, { "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "db": "CNNVD", "id": "CNNVD-201608-012" }, { "db": "NVD", "id": "CVE-2016-6366" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON. Bug ID CSCva92151 or EXTRABACON It is published as.A remote authenticated user may be able to exploit IPv4 SNMP Arbitrary code may be executed via packets. The CiscoASA5500 Series Adaptive Security Appliance is a modular platform for providing security and VPN services with firewall, IPS, anti-X and VPN services. A remote code execution vulnerability exists in the SNMP code for CiscoAdaptiveSecurityAppliance(ASA)Software. Cisco Adaptive Security Appliance products are prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. \nThis issue being tracked by Cisco Bug ID CSCva92151", "sources": [ { "db": "NVD", "id": "CVE-2016-6366" }, { "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "db": "CNVD", "id": "CNVD-2016-06432" }, { "db": "BID", "id": "92521" }, { "db": "VULHUB", "id": "VHN-95186" }, { "db": "VULMON", "id": "CVE-2016-6366" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-95186", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=40258", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-95186" }, { "db": "VULMON", "id": "CVE-2016-6366" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6366", "trust": 4.3 }, { "db": "BID", "id": "92521", "trust": 2.1 }, { "db": "SECTRACK", "id": "1036637", "trust": 1.2 }, { "db": "EXPLOIT-DB", "id": "40258", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2016-004414", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201608-012", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-06432", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95186", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-6366", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06432" }, { "db": "VULHUB", "id": "VHN-95186" }, { "db": "VULMON", "id": "CVE-2016-6366" }, { "db": "BID", "id": "92521" }, { "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "db": "CNNVD", "id": "CNNVD-201608-012" }, { "db": "NVD", "id": "CVE-2016-6366" } ] }, "id": "VAR-201608-0222", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-06432" }, { "db": "VULHUB", "id": "VHN-95186" } ], "trust": 1.3157576999999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06432" } ] }, "last_update_date": "2024-11-23T22:59:28.010000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20160817-asa-snmp", "trust": 0.8, "url": "http://blogs.cisco.com/security/shadow-brokers" }, { "title": "Patch for CiscoAdaptiveSecurityApplianceSoftware Remote Code Execution Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/80568" }, { "title": "Cisco Adaptive Security Appliance Software Fixes for remote code execution vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63641" }, { "title": "Cisco: Cisco Adaptive Security Appliance SNMP Remote Code Execution Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20160817-asa-snmp" }, { "title": "https://github.com/RoyeeW/pentest-wiki", "trust": 0.1, "url": "https://github.com/RoyeeW/pentest-wiki " }, { "title": "MS17-010", "trust": 0.1, "url": "https://github.com/pythonone/MS17-010 " }, { "title": "CVE-2016-6366", "trust": 0.1, "url": "https://github.com/RiskSense-Ops/CVE-2016-6366 " }, { "title": "https://github.com/nixawk/pentest-wiki", "trust": 0.1, "url": "https://github.com/nixawk/pentest-wiki " }, { "title": "https://github.com/erSubhashThapa/pentestwiki", "trust": 0.1, "url": "https://github.com/erSubhashThapa/pentestwiki " }, { "title": "https://github.com/zerosum0x0-archive/archive", "trust": 0.1, "url": "https://github.com/zerosum0x0-archive/archive " }, { "title": "VPN arsenal", "trust": 0.1, "url": "https://github.com/0x90/vpn-arsenal " }, { "title": "Awesome Scapy", "trust": 0.1, "url": "https://github.com/gpotter2/awesome-scapy " }, { "title": "Awesome Scapy", "trust": 0.1, "url": "https://github.com/secdev/awesome-scapy " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/JERRY123S/all-poc " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/hktalent/TOP " }, { "title": "Table of Contents", "trust": 0.1, "url": "https://github.com/CVEDB/top " }, { "title": "Table of Contents", "trust": 0.1, "url": "https://github.com/CVEDB/awesome-cve-repo " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/weeka10/-hktalent-TOP " }, { "title": "TOP\nTable of Contents\nDonation", "trust": 0.1, "url": "https://github.com/cyberanand1337x/bug-bounty-2022 " }, { "title": "Known Exploited Vulnerabilities Detector", "trust": 0.1, "url": "https://github.com/Ostorlab/KEV " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-begins-patching-equation-group-asa-zero-day/120124/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/leaked-shadowbrokers-attack-upgraded-to-target-current-versions-of-cisco-asa/120102/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06432" }, { "db": "VULMON", "id": "CVE-2016-6366" }, { "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "db": "CNNVD", "id": "CNNVD-201608-012" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.0 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95186" }, { "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "db": "NVD", "id": "CVE-2016-6366" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160817-asa-snmp" }, { "trust": 2.1, "url": "http://blogs.cisco.com/security/shadow-brokers" }, { "trust": 1.8, "url": "http://tools.cisco.com/security/center/viewerp.x?alertid=erp-56516" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/92521" }, { "trust": 1.3, "url": "https://www.exploit-db.com/exploits/40258/" }, { "trust": 1.2, "url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip" }, { "trust": 1.2, "url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1036637" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6366" }, { "trust": 0.8, "url": "https://cisa.gov/known-exploited-vulnerabilities-catalog" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/royeew/pentest-wiki" }, { "trust": 0.1, "url": "https://github.com/pythonone/ms17-010" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-06432" }, { "db": "VULHUB", "id": "VHN-95186" }, { "db": "VULMON", "id": "CVE-2016-6366" }, { "db": "BID", "id": "92521" }, { "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "db": "CNNVD", "id": "CNNVD-201608-012" }, { "db": "NVD", "id": "CVE-2016-6366" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-06432" }, { "db": "VULHUB", "id": "VHN-95186" }, { "db": "VULMON", "id": "CVE-2016-6366" }, { "db": "BID", "id": "92521" }, { "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "db": "CNNVD", "id": "CNNVD-201608-012" }, { "db": "NVD", "id": "CVE-2016-6366" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-22T00:00:00", "db": "CNVD", "id": "CNVD-2016-06432" }, { "date": "2016-08-18T00:00:00", "db": "VULHUB", "id": "VHN-95186" }, { "date": "2016-08-18T00:00:00", "db": "VULMON", "id": "CVE-2016-6366" }, { "date": "2016-08-17T00:00:00", "db": "BID", "id": "92521" }, { "date": "2016-08-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "date": "2016-08-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-012" }, { "date": "2016-08-18T18:59:00.117000", "db": "NVD", "id": "CVE-2016-6366" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-19T00:00:00", "db": "CNVD", "id": "CNVD-2016-06432" }, { "date": "2016-11-28T00:00:00", "db": "VULHUB", "id": "VHN-95186" }, { "date": "2023-08-15T00:00:00", "db": "VULMON", "id": "CVE-2016-6366" }, { "date": "2016-08-17T00:00:00", "db": "BID", "id": "92521" }, { "date": "2024-07-08T04:48:00", "db": "JVNDB", "id": "JVNDB-2016-004414" }, { "date": "2016-08-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201608-012" }, { "date": "2024-11-21T02:55:59.330000", "db": "NVD", "id": "CVE-2016-6366" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Adaptive Security Appliance Software Remote Code Execution Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2016-06432" }, { "db": "CNNVD", "id": "CNNVD-201608-012" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201608-012" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.