ID

VAR-201306-0169


CVE

CVE-2013-3386


TITLE

Cisco Email Security Appliance and content Runs on a Security Management appliance device AsyncOS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-003155

DESCRIPTION

The IronPort Spam Quarantine (ISQ) component in the web framework in IronPort AsyncOS on Cisco Email Security Appliance devices before 7.1.5-106 and 7.3, 7.5, and 7.6 before 7.6.3-019 and Content Security Management Appliance devices before 7.9.1-102 and 8.0 before 8.0.0-404 allows remote attackers to cause a denial of service (service crash or hang) via a high rate of TCP connection attempts, aka Bug IDs CSCzv25573 and CSCzv81712. Vendors have confirmed this vulnerability Bug ID CSCzv25573 ,and CSCzv81712 It is released as.By a third party, TCP Service disruption through connection attempt ( Service crash or hang ) There is a possibility of being put into a state. Multiple Cisco products is prone to a denial-of-service vulnerability. Successfully exploiting this issue allows remote attackers to cause denial-of-service conditions. This issue is being tracked by Cisco Bug IDs CSCzv25573 and CSCzv81712

Trust: 1.98

sources: NVD: CVE-2013-3386 // JVNDB: JVNDB-2013-003155 // BID: 60806 // VULHUB: VHN-63388

AFFECTED PRODUCTS

vendor:ciscomodel:ironport asyncosscope:eqversion:7.3

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:7.6

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:7.9

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:7.5

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:lteversion:7.1.5

Trust: 1.0

vendor:ciscomodel:asyncosscope:ltversion:8.0 (*2)

Trust: 0.8

vendor:ciscomodel:asyncosscope:eqversion:7.6.3-019

Trust: 0.8

vendor:ciscomodel:e email security the appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:asyncosscope:eqversion:7.1.5-106

Trust: 0.8

vendor:ciscomodel:content security management appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:asyncosscope:eqversion:7.5 (*1)

Trust: 0.8

vendor:ciscomodel:asyncosscope:ltversion:(*2)

Trust: 0.8

vendor:ciscomodel:asyncosscope:eqversion:7.3 (*1)

Trust: 0.8

vendor:ciscomodel:asyncosscope:eqversion:7.9.1-102

Trust: 0.8

vendor:ciscomodel:asyncosscope:eqversion:8.0.0-404

Trust: 0.8

vendor:ciscomodel:asyncosscope:ltversion:(*1)

Trust: 0.8

vendor:ciscomodel:asyncosscope:ltversion:7.6 (*1)

Trust: 0.8

vendor:ciscomodel:ironport asyncosscope:eqversion:7.1.5

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:7.6.2

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.6.1

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.6

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.5.2

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.5.1

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.5

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.3.2

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.3.1

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.1.5

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.1.4

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.1.3

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.1.2

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.1.1

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:7.9.1

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:7.9

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:7.7.1

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:7.7

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:7.2.1

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:7.6.3-019

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:7.1.5-106

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:neversion:8.0.0-404

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:neversion:7.9.1-102

Trust: 0.3

sources: BID: 60806 // JVNDB: JVNDB-2013-003155 // CNNVD: CNNVD-201306-503 // NVD: CVE-2013-3386

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3386
value: HIGH

Trust: 1.0

NVD: CVE-2013-3386
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201306-503
value: HIGH

Trust: 0.6

VULHUB: VHN-63388
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-3386
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-63388
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-63388 // JVNDB: JVNDB-2013-003155 // CNNVD: CNNVD-201306-503 // NVD: CVE-2013-3386

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-63388 // JVNDB: JVNDB-2013-003155 // NVD: CVE-2013-3386

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201306-503

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201306-503

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003155

PATCH

title:29452url:http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=29452

Trust: 0.8

title:cisco-sa-20130626-smaurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-sma

Trust: 0.8

title:cisco-sa-20130626-esaurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa

Trust: 0.8

title:29727url:http://tools.cisco.com/security/center/viewAlert.x?alertId=29727

Trust: 0.8

title:cisco-sa-20130626-smaurl:http://www.cisco.com/cisco/web/support/JP/111/1118/1118426_cisco-sa-20130626-sma-j.html

Trust: 0.8

title:cisco-sa-20130626-esaurl:http://www.cisco.com/cisco/web/support/JP/111/1118/1118427_cisco-sa-20130626-esa-j.html

Trust: 0.8

title:Cisco AsyncOS Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=186287

Trust: 0.6

sources: JVNDB: JVNDB-2013-003155 // CNNVD: CNNVD-201306-503

EXTERNAL IDS

db:NVDid:CVE-2013-3386

Trust: 2.8

db:BIDid:60806

Trust: 1.0

db:JVNDBid:JVNDB-2013-003155

Trust: 0.8

db:CNNVDid:CNNVD-201306-503

Trust: 0.7

db:CISCOid:20130626 MULTIPLE VULNERABILITIES IN CISCO CONTENT SECURITY MANAGEMENT APPLIANCE

Trust: 0.6

db:CISCOid:20130626 MULTIPLE VULNERABILITIES IN CISCO EMAIL SECURITY APPLIANCE

Trust: 0.6

db:VULHUBid:VHN-63388

Trust: 0.1

sources: VULHUB: VHN-63388 // BID: 60806 // JVNDB: JVNDB-2013-003155 // CNNVD: CNNVD-201306-503 // NVD: CVE-2013-3386

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-sma

Trust: 2.0

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130626-esa

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3386

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3386

Trust: 0.8

url:http://www.securityfocus.com/bid/60806

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=29727

Trust: 0.3

sources: VULHUB: VHN-63388 // BID: 60806 // JVNDB: JVNDB-2013-003155 // CNNVD: CNNVD-201306-503 // NVD: CVE-2013-3386

CREDITS

Cisco

Trust: 0.9

sources: BID: 60806 // CNNVD: CNNVD-201306-503

SOURCES

db:VULHUBid:VHN-63388
db:BIDid:60806
db:JVNDBid:JVNDB-2013-003155
db:CNNVDid:CNNVD-201306-503
db:NVDid:CVE-2013-3386

LAST UPDATE DATE

2024-08-14T14:28:03.232000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-63388date:2018-10-30T00:00:00
db:BIDid:60806date:2013-06-26T00:00:00
db:JVNDBid:JVNDB-2013-003155date:2013-07-01T00:00:00
db:CNNVDid:CNNVD-201306-503date:2022-03-21T00:00:00
db:NVDid:CVE-2013-3386date:2018-10-30T16:27:22.513

SOURCES RELEASE DATE

db:VULHUBid:VHN-63388date:2013-06-27T00:00:00
db:BIDid:60806date:2013-06-26T00:00:00
db:JVNDBid:JVNDB-2013-003155date:2013-07-01T00:00:00
db:CNNVDid:CNNVD-201306-503date:2013-06-28T00:00:00
db:NVDid:CVE-2013-3386date:2013-06-27T21:55:07.090