Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2016-6439 | First vendor Publication | 2016-10-27 |
Vendor | Cve | Last vendor Modification | 2017-07-29 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.5 | ||
Base Score | 7.5 | Environmental Score | 7.5 |
impact SubScore | 3.6 | Temporal Score | 7.5 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the detection engine reassembly of HTTP packets for Cisco Firepower System Software before 6.0.1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper handling of an HTTP packet stream. An attacker could exploit this vulnerability by sending a crafted HTTP packet stream to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6439 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-10-20 | Cisco Snort HTTP chunked transfer encoding processing denial of service attempt RuleID : 40504 - Revision : 1 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-11-02 | Name : The packet inspection software on the remote host is affected by a denial of ... File : cisco-sa-20161019-fpsnort.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|---|
BID | http://www.securityfocus.com/bid/93787 |
CONFIRM | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
SECTRACK | http://www.securitytracker.com/id/1037061 |
Alert History
Date | Informations |
---|---|
2021-05-04 12:53:42 |
|
2021-04-22 02:04:53 |
|
2020-05-23 00:52:40 |
|
2017-07-29 12:05:21 |
|
2016-11-29 00:26:33 |
|
2016-11-03 13:24:29 |
|
2016-10-31 17:24:12 |
|
2016-10-28 17:23:32 |
|