CVE-2014-3399

The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.2(.2.4) and earlier does not properly manage session information during creation of a SharePoint handler, which allows remote authenticated users to overwrite arbitrary RAMFS cache files or inject Lua programs, and consequently cause a denial of service (portal outage or system reload), via crafted HTTP requests, aka Bug ID CSCup54208.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*

History

02 Jun 2022, 15:47

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*
References (CISCO) http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3399 - Vendor Advisory (CISCO) http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3399 - Broken Link, Vendor Advisory

Information

Published : 2014-10-07 10:55

Updated : 2024-02-04 18:35


NVD link : CVE-2014-3399

Mitre link : CVE-2014-3399

CVE.ORG link : CVE-2014-3399


JSON object : View

Products Affected

cisco

  • adaptive_security_appliance_software
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')