Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-9225

EPSS 1.75% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-9225

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the data plane IP fragment handler of the Cisco Adaptive Security Appliance (ASA) CX Context-Aware Security module could allow an unauthenticated, remote attacker to cause the CX module to be unable to process further traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of IP fragments. An attacker could exploit this vulnerability by sending crafted fragmented IP traffic across the CX module. An exploit could allow the attacker to exhaust free packet buffers in shared memory (SHM), causing the CX module to be unable to process further traffic, resulting in a DoS condition. This vulnerability affects all versions of the ASA CX Context-Aware Security module. Cisco has not released and will not release software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Bug IDs: CSCva62946.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
资源管理错误
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Adaptive Security Appliance CX Context-Aware Security模块安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Adaptive Security Appliance(ASA) CX Context-Aware Security是美国思科(Cisco)公司的一款用于扩展ASA平台的附加服务模块。 Cisco ASA CX Context-Aware Security模块中的data plane IP fragment handler存在安全漏洞,该漏洞源于程序没有正确的处理IP段。远程攻击者可利用该漏洞造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-all versions of the ASA CX Context-Aware Security module all versions of the ASA CX Context-Aware Security module -

II. Public POCs for CVE-2016-9225

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-9225

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-02-01 · 13 CVEs total

CVE-2017-5630PEAR Base System 安全漏洞
CVE-2016-2938IBM iNotes和Domino 跨站脚本漏洞
CVE-2016-5884IBM iNotes和Domino 跨站脚本漏洞
CVE-2016-10079SAP GUI SAPlpd 安全漏洞
CVE-2017-3790Cisco Expressway Series Software和Cisco TelePresence VCS Software 安全漏洞
CVE-2017-3791Cisco Prime Home 安全漏洞
CVE-2017-3792多款Cisco产品Cisco TelePresence Software 输入验证漏洞
CVE-2016-10164libXpm 数字错误漏洞
CVE-2016-10173minitar 路径遍历漏洞
CVE-2016-4038Samsung手机安全漏洞
CVE-2016-9963Exim 安全漏洞
CVE-2017-3823Cisco WebEx extensions和plugins 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2016-9225

No comments yet


Leave a comment