CVE-2016-6366

Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.
References
Link Resource
http://blogs.cisco.com/security/shadow-brokers Exploit Press/Media Coverage Vendor Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp Vendor Advisory
http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516 Vendor Advisory
http://www.securityfocus.com/bid/92521 Broken Link Not Applicable Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036637 Broken Link Third Party Advisory VDB Entry
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip Broken Link Exploit
https://www.exploit-db.com/exploits/40258/ Third Party Advisory VDB Entry
https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html Exploit Technical Description
http://blogs.cisco.com/security/shadow-brokers Exploit Press/Media Coverage Vendor Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp Vendor Advisory
http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516 Vendor Advisory
http://www.securityfocus.com/bid/92521 Broken Link Not Applicable Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036637 Broken Link Third Party Advisory VDB Entry
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip Broken Link Exploit
https://www.exploit-db.com/exploits/40258/ Third Party Advisory VDB Entry
https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html Exploit Technical Description
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:pix_firewall_software:-:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:pix_firewall_501:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:pix_firewall_506:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:pix_firewall_506e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:pix_firewall_515:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:pix_firewall_515e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:pix_firewall_520:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:pix_firewall_525:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:pix_firewall_535:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:7604:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:7606-s:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:7609-s:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:7613-s:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5500:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5500-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5500_csc-ssm:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6500-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:cisco:asa_1000v_cloud_firewall_software:8.7.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asa_1000v_cloud_firewall_software:8.7.1.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-08-18 18:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-6366

Mitre link : CVE-2016-6366

CVE.ORG link : CVE-2016-6366


JSON object : View

Products Affected

cisco

  • 7606-s
  • pix_firewall_501
  • asa_5520
  • asa_5506-x
  • asa_5525-x
  • catalyst_6513
  • asa_5512-x
  • pix_firewall_515
  • asa_5505
  • pix_firewall_520
  • pix_firewall_506e
  • asa_5515-x
  • asa_5540
  • pix_firewall_software
  • asa_5500_csc-ssm
  • asa_5555-x
  • catalyst_6503-e
  • pix_firewall_535
  • asa_5500-x
  • asa_5550
  • asa_5516-x
  • adaptive_security_appliance_software
  • catalyst_6506-e
  • catalyst_6509-v-e
  • asa_5510
  • asa_5500
  • asa_1000v_cloud_firewall_software
  • asa_5508-x
  • 7604
  • asa_5506h-x
  • catalyst_6509-neb-a
  • asa_5585-x
  • catalyst_6509-e
  • catalyst_6513-e
  • 7609-s
  • asa_5580
  • catalyst_6504-e
  • pix_firewall_525
  • pix_firewall_506
  • 7613-s
  • asa_5506w-x
  • catalyst_6500
  • pix_firewall_515e
  • asa_5545-x
  • catalyst_6500-e
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')