Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2017-3793 | First vendor Publication | 2017-04-20 |
Vendor | Cve | Last vendor Modification | 2023-08-15 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L | |||
---|---|---|---|
Overall CVSS Score | 4 | ||
Base Score | 4 | Environmental Score | 4 |
impact SubScore | 1.4 | Temporal Score | 4 |
Exploitabality Sub Score | 2.2 | ||
Attack Vector | Network | Attack Complexity | High |
Privileges Required | None | User Interaction | None |
Scope | Changed | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | Low |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the TCP normalizer of Cisco Adaptive Security Appliance (ASA) Software (8.0 through 8.7 and 9.0 through 9.6) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause Cisco ASA and FTD to drop any further incoming traffic on all interfaces, resulting in a denial of service (DoS) condition. The vulnerability is due to improper limitation of the global out-of-order TCP queue for specific block sizes. An attacker could exploit this vulnerability by sending a large number of unique permitted TCP connections with out-of-order segments. An exploit could allow the attacker to exhaust available blocks in the global out-of-order TCP queue, causing the dropping of any further incoming traffic on all interfaces and resulting in a DoS condition. Cisco Bug IDs: CSCvb46321. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3793 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|---|
BID | http://www.securityfocus.com/bid/97923 |
CONFIRM | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
SECTRACK | http://www.securitytracker.com/id/1038329 |
Alert History
Date | Informations |
---|---|
2023-08-15 21:28:38 |
|
2023-08-12 05:28:54 |
|
2021-05-04 13:01:49 |
|
2021-04-22 02:15:08 |
|
2020-05-23 01:00:30 |
|
2019-10-03 09:20:23 |
|
2018-10-31 00:21:17 |
|
2018-05-08 12:07:36 |
|
2017-07-11 12:05:29 |
|
2017-04-28 21:23:16 |
|
2017-04-22 09:25:40 |
|
2017-04-21 05:22:27 |
|