Show plain JSON{"id": "CVE-2016-10259", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.2}]}, "published": "2017-04-11T14:59:00.163", "references": [{"url": "http://www.securityfocus.com/bid/97525", "tags": ["Third Party Advisory", "VDB Entry"], "source": "secure@symantec.com"}, {"url": "https://bto.bluecoat.com/security-advisory/sa142", "tags": ["Vendor Advisory"], "source": "secure@symantec.com"}, {"url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA142", "source": "secure@symantec.com"}, {"url": "http://www.securityfocus.com/bid/97525", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bto.bluecoat.com/security-advisory/sa142", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA142", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-399"}]}], "descriptions": [{"lang": "en", "value": "Symantec SSL Visibility (SSLV) 3.8.4FC, 3.9, 3.10 before 3.10.4.1, and 3.11 before 3.11.3.1 is susceptible to a denial-of-service vulnerability that impacts the SSL servers for intercepted SSL connections. A malicious SSL client can, under certain circumstances, temporarily exhaust the TCP connection pool of an SSL server."}, {"lang": "es", "value": "Symantec SSL Visibility (SSLV) 3.8.4FC, 3.9, 3.10 anterior a 3.10.4.1 y versiones 3.11 anteriores a la 3.11.3.1 es susceptible a una vulnerabilidad de denegaci\u00f3n de servicio (DoS) que impacta en los servidores SSL para las conexiones SSL interceptadas. Un cliente SSL puede, bajo ciertas circunstancias, agotar temporalmente el grupo de conexiones TCP de un servidor SSL."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv1800_firmware:3.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EC6E120-7880-410E-A119-CD348894471B"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv1800_firmware:3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2F161E0-B0F2-4516-817B-8581D398B47C"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv1800_firmware:3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "424E4E7A-0215-439D-9CF9-58A4D420772D"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv1800_firmware:3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60974CE1-9469-4302-A20B-C1A01D00EEC6"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv1800_firmware:3.11.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA482EE3-6DD5-4B41-A317-7782EF54DDD4"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv1800_firmware:3.11.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73657251-381C-40AB-B731-1D7D727E6E42"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv1800_firmware:3.11.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D39C16E0-81A9-466D-AE78-1D7AE9FAFEF8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bluecoat:ssl_visibility_appliance_sv1800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DDBD7D36-8599-427A-B397-B7443B864B81"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv800_firmware:3.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EFEB60C-43EC-4D24-840C-410B5C256761"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv800_firmware:3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BF1D9B5-103A-4379-AE90-223BB4672A36"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv800_firmware:3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A056B850-DE63-47AF-8D91-464B6F702D88"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv800_firmware:3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5290154-4079-49A2-A02A-13DA0D37B069"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv800_firmware:3.11.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD856EDC-EEFD-489C-A80A-0A56D5CD385C"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv800_firmware:3.11.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C9FC05-EBF0-4647-8523-9A6FE56AF3D9"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv800_firmware:3.11.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74C6EA1A-B64F-4E07-9311-AF15B4866A5D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bluecoat:ssl_visibility_appliance_sv800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9A4C04F5-F848-46C6-8042-C8C8D3185DF1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv3800_firmware:3.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "768238C0-E300-4242-B98A-2EC776E7E6ED"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv3800_firmware:3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98BD9F92-EF2F-4FAA-A7A6-81755BFC8D5B"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv3800_firmware:3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6667057C-E17B-4BD2-872E-AB2F0B34FD70"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv3800_firmware:3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DF97CAD-E3FA-4749-973D-D769E61679CC"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv3800_firmware:3.11.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F232607-EC3D-4059-BA8D-A8ADAAD79B62"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv3800_firmware:3.11.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA570F5C-2D36-4F4F-84B2-97B795DF05F5"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv3800_firmware:3.11.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC884D99-F68C-4D05-B1B2-6376C7757C43"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bluecoat:ssl_visibility_appliance_sv3800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3BD1D419-3EFA-4A72-A022-D1DE9C2DAA1C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv2800_firmware:3.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D02D12FA-47E2-4FF1-B0CC-58B6BE35CB2F"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv2800_firmware:3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9474C88E-E9DB-428B-ADC9-8C41B3DA6CE9"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv2800_firmware:3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36B9B9A3-A642-4827-A677-550A41481637"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv2800_firmware:3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AD81B90-9F01-4320-899C-C10267226417"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv2800_firmware:3.11.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7106365-8624-491E-9CA6-FBDA0BB9705F"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv2800_firmware:3.11.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A06A5C31-4934-4329-AC68-F66F6F30CA92"}, {"criteria": "cpe:2.3:o:bluecoat:ssl_visibility_appliance_sv2800_firmware:3.11.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D212D919-5AB1-4725-88C1-694987E98563"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:bluecoat:ssl_visibility_appliance_sv2800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C4F5439C-9000-4DC2-8AB6-A744F5638A15"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "secure@symantec.com"}