CVE-2017-6721
Summary
| CVE | CVE-2017-6721 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-07-04 00:29:00 UTC |
| Updated | 2017-07-07 14:53:00 UTC |
| Description | A vulnerability in the ingress processing of fragmented TCP packets by Cisco Wide Area Application Services (WAAS) could allow an unauthenticated, remote attacker to cause the WAASNET process to restart unexpectedly, causing a denial of service (DoS) condition. More Information: CSCvc57428. Known Affected Releases: 6.3(1). Known Fixed Releases: 6.3(0.143) 6.2(3c)6 6.2(3.22). |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cisco | Wide Area Application Services | 6.3(1) | All | All | All |
| Application | Cisco | Wide Area Application Services | 6.3\(1\) | All | All | All |
| Application | Cisco | Wide Area Application Services | 6.3\(1\) | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Wide Area Application Services CVE-2017-6721 Remote Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Cisco Wide Area Application Services TCP Fragment Denial of Service Vulnerability | CONFIRM | tools.cisco.com | Vendor Advisory |
| Cisco Wide Area Application Services TCP Fragment Input Validation Flaw Lets Remote Users Cause the Target WAASNET Process to Reload - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.