Vulnerabilities > CVE-2013-3385 - Resource Management Errors vulnerability in Cisco Ironport Asyncos

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The management GUI in the web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-602; Email Security Appliance devices before 7.1.5-106 and 7.3, 7.5, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.9.1-102 and 8.0 before 8.0.0-404 allows remote attackers to cause a denial of service (system hang) via a series of (1) HTTP or (2) HTTPS requests to a management interface, aka Bug IDs CSCzv58669, CSCzv63329, and CSCzv78669.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyCISCO
    NASL idCISCO-SA-20130626-SMA.NASL
    descriptionAccording to its self-reported version, the version of Cisco Content Security Management Appliance running on the remote host has the following vulnerabilities : - An unspecified vulnerability exists in the web framework that could allow a remote, authenticated attacker to execute arbitrary commands. (CVE-2013-3384) - A denial of service vulnerability exists in the web framework that could allow a remote, unauthenticated attacker to make the system unresponsive. (CVE-2013-3385) - A denial of service vulnerability exists in the management GUI that could allow a remote, unauthenticated attacker to make the system unresponsive. (CVE-2013-3386)
    last seen2020-06-01
    modified2020-06-02
    plugin id69079
    published2013-07-26
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69079
    titleMultiple Vulnerabilities in Cisco Content Security Management Appliance (cisco-sa-20130626-sma)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(69079);
      script_version("1.5");
      script_cvs_date("Date: 2018/11/15 20:50:20");
    
      script_cve_id("CVE-2013-3384", "CVE-2013-3385", "CVE-2013-3386");
      script_bugtraq_id(60805, 60806, 60807);
      script_xref(name:"CISCO-BUG-ID", value:"CSCzv24579");
      script_xref(name:"CISCO-BUG-ID", value:"CSCzv78669");
      script_xref(name:"CISCO-BUG-ID", value:"CSCzv81712");
      script_xref(name:"CISCO-SA", value:"cisco-sa-20130626-sma");
    
      script_name(english:"Multiple Vulnerabilities in Cisco Content Security Management Appliance (cisco-sa-20130626-sma)");
      script_summary(english:"Checks SMA version");
    
      script_set_attribute(attribute:"synopsis", value:"The remote security appliance is missing a vendor-supplied patch.");
      script_set_attribute(
        attribute:"description",
        value:
    "According to its self-reported version, the version of Cisco Content
    Security Management Appliance running on the remote host has the
    following vulnerabilities :
    
      - An unspecified vulnerability exists in the web framework
        that could allow a remote, authenticated attacker to
        execute arbitrary commands. (CVE-2013-3384)
    
      - A denial of service vulnerability exists in the web
        framework that could allow a remote, unauthenticated
        attacker to make the system unresponsive.
        (CVE-2013-3385)
    
      - A denial of service vulnerability exists in the
        management GUI that could allow a remote,
        unauthenticated attacker to make the system
        unresponsive. (CVE-2013-3386)"
      );
      # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-sma
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?721fa320");
      script_set_attribute(
        attribute:"solution",
        value:
    "Apply the relevant update referenced in Cisco Security Advisory
    cisco-sa-20130626-sma."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/06/26");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/26");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:content_security_management_appliance");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"CISCO");
    
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
    
      script_dependencies("cisco_sma_version.nasl");
      script_require_keys("Host/AsyncOS/Cisco Content Security Management Appliance/DisplayVersion", "Host/AsyncOS/Cisco Content Security Management Appliance/Version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    display_ver = get_kb_item_or_exit('Host/AsyncOS/Cisco Content Security Management Appliance/DisplayVersion');
    ver = get_kb_item_or_exit('Host/AsyncOS/Cisco Content Security Management Appliance/Version');
    
    if (ver =~ "^[0-6]\." || ver =~ "^7\.[012]\.") # 7.2 and earlier
      display_fix = '7.9.1-102';
    else if (ver =~ "^7\.7\.")
      display_fix = '7.9.1-102';
    else if (ver =~ "^7\.8\.")
      display_fix = '7.9.1-102';
    else if (ver =~ "^7\.9\.")
      display_fix = '7.9.1-102';
    else if (ver =~ "^8\.0\.")
      display_fix = '8.0.0-404';
    else
      audit(AUDIT_INST_VER_NOT_VULN, 'Cisco SMA', display_ver);
    
    fix = str_replace(string:display_fix, find:'-', replace:'.');
    
    if (ver_compare(ver:ver, fix:fix, strict:FALSE) >= 0)
      audit(AUDIT_INST_VER_NOT_VULN, 'Cisco SMA', display_ver);
    
    if (report_verbosity > 0)
    {
      report =
        '\n  Installed version : ' + display_ver +
        '\n  Fixed version     : ' + display_fix + '\n';
      security_hole(port:0, extra:report);
    }
    else security_hole(0);
    
    
  • NASL familyCISCO
    NASL idCISCO-SA-20130626-ESA.NASL
    descriptionAccording to its self-reported version, the Cisco AsyncOS running on the remote Cisco Email Security (ESA) appliance is affected by multiple vulnerabilities : - An unspecified vulnerability exists in the web framework that could allow a remote, authenticated attacker to execute arbitrary commands. (CVE-2013-3384) - A denial of service vulnerability exists in the web framework that could allow a remote, unauthenticated attacker to make the system unresponsive. (CVE-2013-3385) - A denial of service vulnerability exists in the management GUI that could allow a remote, unauthenticated attacker to make the system unresponsive. (CVE-2013-3386)
    last seen2020-06-01
    modified2020-06-02
    plugin id69076
    published2013-07-26
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69076
    titleMultiple Vulnerabilities in Cisco Email Security Appliance (cisco-sa-20130626-esa)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(69076);
      script_version("1.7");
      script_cvs_date("Date: 2018/11/15 20:50:20");
    
      script_cve_id("CVE-2013-3384", "CVE-2013-3385", "CVE-2013-3386");
      script_bugtraq_id(60805, 60806, 60807);
      script_xref(name:"CISCO-BUG-ID", value:"CSCzv25573");
      script_xref(name:"CISCO-BUG-ID", value:"CSCzv44633");
      script_xref(name:"CISCO-BUG-ID", value:"CSCzv63329");
      script_xref(name:"CISCO-SA", value:"cisco-sa-20130626-esa");
    
      script_name(english:"Multiple Vulnerabilities in Cisco Email Security Appliance (cisco-sa-20130626-esa)");
      script_summary(english:"Checks ESA version");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote security appliance is missing a vendor-supplied security
    patch.");
      script_set_attribute(
        attribute:"description",
        value:
    "According to its self-reported version, the Cisco AsyncOS running on
    the remote Cisco Email Security (ESA) appliance is affected by
    multiple vulnerabilities :
    
      - An unspecified vulnerability exists in the web framework
        that could allow a remote, authenticated attacker to
        execute arbitrary commands. (CVE-2013-3384)
    
      - A denial of service vulnerability exists in the web
        framework that could allow a remote, unauthenticated
        attacker to make the system unresponsive.
        (CVE-2013-3385)
    
      - A denial of service vulnerability exists in the
        management GUI that could allow a remote,
        unauthenticated attacker to make the system
        unresponsive. (CVE-2013-3386)"
      );
      # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e9e55d4e");
      script_set_attribute(
        attribute:"solution",
        value:
    "Apply the relevant update referenced in Cisco Security Advisory
    cisco-sa-20130626-esa."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/06/26");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/26");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:email_security_appliance");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:email_security_appliance_firmware");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"CISCO");
    
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
    
      script_dependencies("cisco_esa_version.nasl");
      script_require_keys("Host/AsyncOS/Cisco Email Security Appliance/DisplayVersion", "Host/AsyncOS/Cisco Email Security Appliance/Version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    display_ver = get_kb_item_or_exit('Host/AsyncOS/Cisco Email Security Appliance/DisplayVersion');
    ver = get_kb_item_or_exit('Host/AsyncOS/Cisco Email Security Appliance/Version');
    
    if (ver =~ "^[0-6]\." || ver =~ "^7\.[01]\.") # 7.1 and prior
      display_fix = '7.1.5-106';
    else if (ver =~ "^7\.3\.")
      display_fix = '8.0.0-671';
    else if (ver =~ "^7\.5\.")
      display_fix = '7.6.3-019';
    else if (ver =~ "^7\.6\.")
      display_fix = '7.6.3-019';
    else
      audit(AUDIT_INST_VER_NOT_VULN, 'Cisco ESA', display_ver);
    
    fix = str_replace(string:display_fix, find:'-', replace:'.');
    
    if (ver_compare(ver:ver, fix:fix, strict:FALSE) >= 0)
      audit(AUDIT_INST_VER_NOT_VULN, 'Cisco ESA', display_ver);
    
    if (report_verbosity > 0)
    {
      report =
        '\n  Installed version : ' + display_ver +
        '\n  Fixed version     : ' + display_fix + '\n';
      security_hole(port:0, extra:report);
    }
    else security_hole(0);
    
    
  • NASL familyCISCO
    NASL idCISCO-SA-20130626-WSA.NASL
    descriptionAccording to its self-reported version, the version of Cisco Web Security Appliance running on the remote host has the following vulnerabilities : - Multiple unspecified vulnerabilities exist in the web framework that could allow a remote, authenticated attacker to execute arbitrary commands. (CVE-2013-3383, CVE-2013-3384) - A denial of service vulnerability exists in the web framework that could allow a remote, unauthenticated attacker to make the system unresponsive. (CVE-2013-3385)
    last seen2020-06-01
    modified2020-06-02
    plugin id69082
    published2013-07-26
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69082
    titleMultiple Vulnerabilities in Cisco Web Security Appliance (cisco-sa-20130626-wsa)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(69082);
      script_version("1.6");
      script_cvs_date("Date: 2018/11/15 20:50:20");
    
      script_cve_id("CVE-2013-3383", "CVE-2013-3384", "CVE-2013-3385");
      script_bugtraq_id(60804, 60805, 60807);
      script_xref(name:"CISCO-BUG-ID", value:"CSCzv58669");
      script_xref(name:"CISCO-BUG-ID", value:"CSCzv69294");
      script_xref(name:"CISCO-BUG-ID", value:"CSCzv85726");
      script_xref(name:"CISCO-SA", value:"cisco-sa-20130626-wsa");
    
      script_name(english:"Multiple Vulnerabilities in Cisco Web Security Appliance (cisco-sa-20130626-wsa)");
      script_summary(english:"Checks WSA version");
    
      script_set_attribute(attribute:"synopsis", value:"The remote security appliance is missing a vendor-supplied patch.");
      script_set_attribute(
        attribute:"description",
        value:
    "According to its self-reported version, the version of Cisco Web
    Security Appliance running on the remote host has the following
    vulnerabilities :
    
      - Multiple unspecified vulnerabilities exist in the web
        framework that could allow a remote, authenticated
        attacker to execute arbitrary commands.
        (CVE-2013-3383, CVE-2013-3384)
    
      - A denial of service vulnerability exists in the web
        framework that could allow a remote, unauthenticated
        attacker to make the system unresponsive.
        (CVE-2013-3385)"
      );
      # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4ce4facb");
      script_set_attribute(
        attribute:"solution",
        value:
    "Apply the relevant update referenced in Cisco Security Advisory
    cisco-sa-20130626-wsa."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/06/26");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/26");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:web_security_appliance");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"CISCO");
    
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
      script_dependencies("cisco_wsa_version.nasl");
      script_require_keys("Host/AsyncOS/Cisco Web Security Appliance/DisplayVersion", "Host/AsyncOS/Cisco Web Security Appliance/Version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    display_ver = get_kb_item_or_exit('Host/AsyncOS/Cisco Web Security Appliance/DisplayVersion');
    ver = get_kb_item_or_exit('Host/AsyncOS/Cisco Web Security Appliance/Version');
    
    if (ver =~ "^[0-6]\." || ver =~ "^7\.[01]\.") # 7.1 and prior
      display_fix = '7.1.3-033';
    else if (ver =~ "^7\.5\.")
      display_fix = '7.5.0-838';
    else if (ver =~ "^7\.7\.")
      display_fix = '7.7.0-602';
    else
      audit(AUDIT_INST_VER_NOT_VULN, 'Cisco WSA', display_ver);
    
    fix = str_replace(string:display_fix, find:'-', replace:'.');
    
    if (ver_compare(ver:ver, fix:fix, strict:FALSE) >= 0)
      audit(AUDIT_INST_VER_NOT_VULN, 'Cisco WSA', display_ver);
    
    if (report_verbosity > 0)
    {
      report =
        '\n  Installed version : ' + display_ver +
        '\n  Fixed version     : ' + display_fix + '\n';
      security_hole(port:0, extra:report);
    }
    else security_hole(0);