Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Cisco Adaptive Security Appliance Software Clientless SSL VPN Heap Overflow Vulnerability
Vulnerability Description
A vulnerability in the handler for HTTP authentication for resources accessed through the Clientless SSL VPN portal of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device or to obtain portions of process memory from an affected device. This vulnerability is due to insufficient bounds checking when parsing specific HTTP authentication messages. An attacker could exploit this vulnerability by sending malicious traffic to an affected device acting as a VPN Gateway. To send this malicious traffic, an attacker would need to control a web server that can be accessed through the Clientless SSL VPN portal. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition, or to retrieve bytes from the device process memory that may contain sensitive information.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H
Vulnerability Type
堆缓冲区溢出
Vulnerability Title
Cisco Adaptive Security Appliances Software 缓冲区错误漏洞
Vulnerability Description
Cisco Adaptive Security Appliances Software(ASA Software)是美国思科(Cisco)公司的一套防火墙和网络安全平台。该平台提供了对数据和网络资源的高度安全的访问等功能。 Cisco Adaptive Security Appliances(ASA) Software存在安全漏洞,该漏洞源于解析特定 HTTP 身份验证消息时边界检查不足。经过身份验证的远程攻击者可以利用该漏洞在受影响的设备上造成拒绝服务 (DoS) 条件或获取受影响设备的部分进程内存。
CVSS Information
N/A
Vulnerability Type
N/A