Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.106184
Kategorie:CISCO
Titel:Cisco Adaptive Security Appliance CLI Remote Code Execution Vulnerability (cisco-sa-20160817-asa-cli)
Zusammenfassung:A vulnerability in the command-line interface (CLI) parser of; Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, local attacker to; create a denial of service (DoS) condition or potentially execute arbitrary code. An attacker; could exploit this vulnerability by invoking certain invalid commands in an affected device.
Beschreibung:Summary:
A vulnerability in the command-line interface (CLI) parser of
Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, local attacker to
create a denial of service (DoS) condition or potentially execute arbitrary code. An attacker
could exploit this vulnerability by invoking certain invalid commands in an affected device.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-6367
BugTraq ID: 92520
http://www.securityfocus.com/bid/92520
Cisco Security Advisory: 20160817 Cisco Adaptive Security Appliance CLI Remote Code Execution Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-cli
https://www.exploit-db.com/exploits/40271/
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40271.zip
http://www.securitytracker.com/id/1036636
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.