CNVD-2016-07438

Vulnerability from cnvd - Published: 2016-09-12
VLAI Severity ?
Title
Cisco ACE30 Application Control Engine Module和ACE 4710 Application Control Engine拒绝服务漏洞
Description
Cisco ACE30 Application Control Engine Module和Cisco ACE 4710 Application Control Engine都是美国思科(Cisco)公司新一代的负载均衡和应用交付解决方案。 Cisco ACE30 Application Control Engine Module和Cisco ACE 4710 Application Control Engine中存在拒绝服务漏洞。攻击者可利用该漏洞造成设备重载,拒绝服务合法用户。
Severity
Formal description

目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法: http://www.cisco.com/

Reference
http://www.securityfocus.com/bid/92867
Impacted products
Name
['Cisco ACE Application Control Engine Module (ACE30) 0', 'Cisco Cisco Application Control Engine ACE 4710 0']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "92867"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-6399"
    }
  },
  "description": "Cisco ACE30 Application Control Engine Module\u548cCisco ACE 4710 Application Control Engine\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u65b0\u4e00\u4ee3\u7684\u8d1f\u8f7d\u5747\u8861\u548c\u5e94\u7528\u4ea4\u4ed8\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nCisco ACE30 Application Control Engine Module\u548cCisco ACE 4710 Application Control Engine\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u8bbe\u5907\u91cd\u8f7d\uff0c\u62d2\u7edd\u670d\u52a1\u5408\u6cd5\u7528\u6237\u3002",
  "discovererName": "Cisco",
  "formalWay": "\u76ee\u524d\u5382\u5546\u6682\u672a\u53d1\u5e03\u4fee\u590d\u63aa\u65bd\u89e3\u51b3\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u6216\u53c2\u8003\u7f51\u5740\u4ee5\u83b7\u53d6\u89e3\u51b3\u529e\u6cd5\uff1a \r\nhttp://www.cisco.com/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-07438",
  "openTime": "2016-09-12",
  "products": {
    "product": [
      "Cisco ACE Application Control Engine Module (ACE30) 0",
      "Cisco Cisco Application Control Engine ACE 4710 0"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/92867",
  "serverity": "\u4e2d",
  "submitTime": "2016-09-09",
  "title": "Cisco ACE30 Application Control Engine Module\u548cACE 4710 Application Control Engine\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…