ID

VAR-201605-0554


CVE

CVE-2016-1379


TITLE

Cisco Adaptive Security Appliance Service disruption in software (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-002955

DESCRIPTION

Cisco Adaptive Security Appliance (ASA) Software 9.0 through 9.5.1 mishandles IPsec error processing, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted (1) LAN-to-LAN or (2) Remote Access VPN tunnel packets, aka Bug ID CSCuv70576. Successful exploits may allow an attacker to exhaust memory, resulting in denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCuv70576. The appliance also includes IPS (Intrusion Prevention System), SSL VPN, IPSec VPN, anti-spam, and more

Trust: 1.98

sources: NVD: CVE-2016-1379 // JVNDB: JVNDB-2016-002955 // BID: 90720 // VULHUB: VHN-90198

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.4.1.1

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.3

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.2.8

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2.4

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.3

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.4.1.3

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.6.6

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.4.1.2

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.37

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.2

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.6

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3\(1.50\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.20

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3\(2.243\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.17

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.4.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.4.0.115

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3.3.6

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.3.6

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.26

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.5.21

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2\(0.0\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.5.15

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.6.8

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.4.1.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2.3.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.4.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.6.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3.3.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.3.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2.2.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3\(1.105\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3.3.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3.3.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2\(0.104\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.1.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.6.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2\(3.1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.5.10

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.29

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2.2.7

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3.2.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2.2.8

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.35

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.5.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3\(2.100\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.2.3.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3.1.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.2.10

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.7

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.1.5.12

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.3.8

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.33

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0.4.24

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.0 to 9.5.1

Trust: 0.8

sources: JVNDB: JVNDB-2016-002955 // CNNVD: CNNVD-201605-437 // NVD: CVE-2016-1379

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1379
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-1379
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201605-437
value: MEDIUM

Trust: 0.6

VULHUB: VHN-90198
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1379
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-90198
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1379
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-90198 // JVNDB: JVNDB-2016-002955 // CNNVD: CNNVD-201605-437 // NVD: CVE-2016-1379

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-90198 // JVNDB: JVNDB-2016-002955 // NVD: CVE-2016-1379

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201605-437

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201605-437

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-002955

PATCH

title:cisco-sa-20160517-asa-vpnurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160517-asa-vpn

Trust: 0.8

title:Cisco Adaptive Security Appliance Ipsec Fixes for code security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61751

Trust: 0.6

sources: JVNDB: JVNDB-2016-002955 // CNNVD: CNNVD-201605-437

EXTERNAL IDS

db:NVDid:CVE-2016-1379

Trust: 2.8

db:JVNDBid:JVNDB-2016-002955

Trust: 0.8

db:CNNVDid:CNNVD-201605-437

Trust: 0.7

db:BIDid:90720

Trust: 0.4

db:VULHUBid:VHN-90198

Trust: 0.1

sources: VULHUB: VHN-90198 // BID: 90720 // JVNDB: JVNDB-2016-002955 // CNNVD: CNNVD-201605-437 // NVD: CVE-2016-1379

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160517-asa-vpn

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1379

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1379

Trust: 0.8

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160517-asa-vpn/

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-90198 // BID: 90720 // JVNDB: JVNDB-2016-002955 // CNNVD: CNNVD-201605-437 // NVD: CVE-2016-1379

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 90720

SOURCES

db:VULHUBid:VHN-90198
db:BIDid:90720
db:JVNDBid:JVNDB-2016-002955
db:CNNVDid:CNNVD-201605-437
db:NVDid:CVE-2016-1379

LAST UPDATE DATE

2024-11-23T22:01:31.593000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-90198date:2016-05-31T00:00:00
db:BIDid:90720date:2016-05-17T00:00:00
db:JVNDBid:JVNDB-2016-002955date:2016-06-01T00:00:00
db:CNNVDid:CNNVD-201605-437date:2016-05-30T00:00:00
db:NVDid:CVE-2016-1379date:2024-11-21T02:46:18.427

SOURCES RELEASE DATE

db:VULHUBid:VHN-90198date:2016-05-28T00:00:00
db:BIDid:90720date:2016-05-17T00:00:00
db:JVNDBid:JVNDB-2016-002955date:2016-06-01T00:00:00
db:CNNVDid:CNNVD-201605-437date:2016-05-18T00:00:00
db:NVDid:CVE-2016-1379date:2016-05-28T01:59:00.117