ID

VAR-201410-0060


CVE

CVE-2014-3399


TITLE

Cisco Adaptive Security Appliance Software SSL VPN Any in the implementation of RAMFS Cache file overwrite vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2014-004569

DESCRIPTION

The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.2(.2.4) and earlier does not properly manage session information during creation of a SharePoint handler, which allows remote authenticated users to overwrite arbitrary RAMFS cache files or inject Lua programs, and consequently cause a denial of service (portal outage or system reload), via crafted HTTP requests, aka Bug ID CSCup54208. Cisco Adaptive Security Appliance (ASA) Software is prone to a vulnerability that may allow attackers to overwrite arbitrary local files. Successful exploits may allow an attacker to overwrite arbitrary files on the RAMFS cache or inject Lua scripts, causing a denial of service condition. This issue is being tracked by Cisco Bug ID CSCup54208. The vulnerability stems from the improper management of session information when the program creates the SharePoint handler

Trust: 1.98

sources: NVD: CVE-2014-3399 // JVNDB: JVNDB-2014-004569 // BID: 70251 // VULHUB: VHN-71339

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:lteversion:9.2\(2.4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope:eqversion:(asa)

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:lteversion:9.2(.2.4)

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2\(.2.4\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1

Trust: 0.6

sources: JVNDB: JVNDB-2014-004569 // CNNVD: CNNVD-201410-128 // NVD: CVE-2014-3399

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3399
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-3399
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201410-128
value: MEDIUM

Trust: 0.6

VULHUB: VHN-71339
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-3399
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-71339
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-71339 // JVNDB: JVNDB-2014-004569 // CNNVD: CNNVD-201410-128 // NVD: CVE-2014-3399

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-71339 // JVNDB: JVNDB-2014-004569 // NVD: CVE-2014-3399

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201410-128

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201410-128

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004569

PATCH

title:Cisco ASA Software SharePoint RAMFS Integrity and Lua Injection Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3399

Trust: 0.8

title:35989url:http://tools.cisco.com/security/center/viewAlert.x?alertId=35989

Trust: 0.8

title:Cisco Adaptive Security Appliances Fixes for code injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194624

Trust: 0.6

sources: JVNDB: JVNDB-2014-004569 // CNNVD: CNNVD-201410-128

EXTERNAL IDS

db:NVDid:CVE-2014-3399

Trust: 2.8

db:JVNDBid:JVNDB-2014-004569

Trust: 0.8

db:CNNVDid:CNNVD-201410-128

Trust: 0.7

db:BIDid:70251

Trust: 0.4

db:VULHUBid:VHN-71339

Trust: 0.1

sources: VULHUB: VHN-71339 // BID: 70251 // JVNDB: JVNDB-2014-004569 // CNNVD: CNNVD-201410-128 // NVD: CVE-2014-3399

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3399

Trust: 1.7

url:http://tools.cisco.com/security/center/viewalert.x?alertid=35989

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3399

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3399

Trust: 0.8

url:http://www.cisco.com/en/us/products/ps6120/index.html

Trust: 0.3

sources: VULHUB: VHN-71339 // BID: 70251 // JVNDB: JVNDB-2014-004569 // CNNVD: CNNVD-201410-128 // NVD: CVE-2014-3399

CREDITS

Alec Stuart-Muirk

Trust: 0.3

sources: BID: 70251

SOURCES

db:VULHUBid:VHN-71339
db:BIDid:70251
db:JVNDBid:JVNDB-2014-004569
db:CNNVDid:CNNVD-201410-128
db:NVDid:CVE-2014-3399

LAST UPDATE DATE

2024-11-23T21:55:16.037000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71339date:2014-10-08T00:00:00
db:BIDid:70251date:2014-10-07T06:00:00
db:JVNDBid:JVNDB-2014-004569date:2014-10-09T00:00:00
db:CNNVDid:CNNVD-201410-128date:2022-06-06T00:00:00
db:NVDid:CVE-2014-3399date:2024-11-21T02:08:00.830

SOURCES RELEASE DATE

db:VULHUBid:VHN-71339date:2014-10-07T00:00:00
db:BIDid:70251date:2014-10-06T00:00:00
db:JVNDBid:JVNDB-2014-004569date:2014-10-09T00:00:00
db:CNNVDid:CNNVD-201410-128date:2014-10-14T00:00:00
db:NVDid:CVE-2014-3399date:2014-10-07T10:55:04.150