ID

VAR-201610-0286


CVE

CVE-2016-6437


TITLE

Cisco WAAS of SSL Service disruption in session cache management (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-005692

DESCRIPTION

A vulnerability in the SSL session cache management of Cisco Wide Area Application Services (WAAS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high consumption of disk space. The user would see a performance degradation. More Information: CSCva03095. Known Affected Releases: 5.3(5), 6.1(1), 6.2(1). Known Fixed Releases: 5.3(5g)1, 6.2(2.32). (DoS) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug ID CSCva03095 It is released as.Service disruption by a third party (DoS) There is a possibility of being put into a state. An attacker can exploit this issue to impact the performance of the device , causing a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCva03095. This software is mainly used in the link environment with small bandwidth and large delay. A remote attacker could exploit this vulnerability by continuously sending a stream of data to the target system to cause a denial of service

Trust: 1.98

sources: NVD: CVE-2016-6437 // JVNDB: JVNDB-2016-005692 // BID: 93524 // VULHUB: VHN-95257

AFFECTED PRODUCTS

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5c

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:6.1.1

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5d

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5a

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5e

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:6.1.0

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5f

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.3

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5b

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.5

Trust: 1.6

vendor:ciscomodel:wide area application servicesscope:eqversion:6.2.1

Trust: 1.0

vendor:ciscomodel:wide area application servicesscope:eqversion:5.3.1

Trust: 1.0

vendor:ciscomodel:wide area application servicesscope:eqversion:6.2.1a

Trust: 1.0

vendor:ciscomodel:wide area application services softwarescope:ltversion:5.3(5g)1

Trust: 0.8

vendor:ciscomodel:wide area application services softwarescope:ltversion:6.2(2.32)

Trust: 0.8

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

sources: BID: 93524 // JVNDB: JVNDB-2016-005692 // CNNVD: CNNVD-201610-807 // NVD: CVE-2016-6437

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6437
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-6437
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201610-807
value: HIGH

Trust: 0.6

VULHUB: VHN-95257
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-6437
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-95257
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6437
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-95257 // JVNDB: JVNDB-2016-005692 // CNNVD: CNNVD-201610-807 // NVD: CVE-2016-6437

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-95257 // JVNDB: JVNDB-2016-005692 // NVD: CVE-2016-6437

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-807

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201610-807

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005692

PATCH

title:cisco-sa-20161012-waasurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161012-waas

Trust: 0.8

title:Cisco Wide Area Application Services Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65141

Trust: 0.6

sources: JVNDB: JVNDB-2016-005692 // CNNVD: CNNVD-201610-807

EXTERNAL IDS

db:NVDid:CVE-2016-6437

Trust: 2.8

db:BIDid:93524

Trust: 1.4

db:SECTRACKid:1037002

Trust: 1.1

db:JVNDBid:JVNDB-2016-005692

Trust: 0.8

db:CNNVDid:CNNVD-201610-807

Trust: 0.7

db:VULHUBid:VHN-95257

Trust: 0.1

sources: VULHUB: VHN-95257 // BID: 93524 // JVNDB: JVNDB-2016-005692 // CNNVD: CNNVD-201610-807 // NVD: CVE-2016-6437

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161012-waas

Trust: 2.0

url:http://www.securityfocus.com/bid/93524

Trust: 1.1

url:http://www.securitytracker.com/id/1037002

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6437

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6437

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/c/en/us/products/routers/wide-area-application-services/index.html

Trust: 0.3

sources: VULHUB: VHN-95257 // BID: 93524 // JVNDB: JVNDB-2016-005692 // CNNVD: CNNVD-201610-807 // NVD: CVE-2016-6437

CREDITS

Cisco

Trust: 0.3

sources: BID: 93524

SOURCES

db:VULHUBid:VHN-95257
db:BIDid:93524
db:JVNDBid:JVNDB-2016-005692
db:CNNVDid:CNNVD-201610-807
db:NVDid:CVE-2016-6437

LAST UPDATE DATE

2025-04-13T23:23:34.726000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-95257date:2017-07-29T00:00:00
db:BIDid:93524date:2016-10-26T09:06:00
db:JVNDBid:JVNDB-2016-005692date:2016-11-04T00:00:00
db:CNNVDid:CNNVD-201610-807date:2016-10-28T00:00:00
db:NVDid:CVE-2016-6437date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-95257date:2016-10-27T00:00:00
db:BIDid:93524date:2016-10-12T00:00:00
db:JVNDBid:JVNDB-2016-005692date:2016-11-04T00:00:00
db:CNNVDid:CNNVD-201610-807date:2016-10-28T00:00:00
db:NVDid:CVE-2016-6437date:2016-10-27T21:59:08.733