Lucene search

K
cve[email protected]CVE-2013-5559
HistoryNov 04, 2013 - 4:55 p.m.

CVE-2013-5559

2013-11-0416:55:05
CWE-119
web.nvd.nist.gov
19
security
vulnerability
cisco
anyconnect
buffer overflow
atl
vpnapi

7.7 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.833 High

EPSS

Percentile

98.4%

Buffer overflow in the Active Template Library (ATL) framework in the VPNAPI COM module in Cisco AnyConnect Secure Mobility Client 2.x allows user-assisted remote attackers to execute arbitrary code via a crafted HTML document, aka Bug ID CSCuj58139.

Affected configurations

NVD
Node
ciscoanyconnect_secure_mobility_clientMatch2.0
OR
ciscoanyconnect_secure_mobility_clientMatch2.1
OR
ciscoanyconnect_secure_mobility_clientMatch2.2
OR
ciscoanyconnect_secure_mobility_clientMatch2.2.128
OR
ciscoanyconnect_secure_mobility_clientMatch2.2.133
OR
ciscoanyconnect_secure_mobility_clientMatch2.2.136
OR
ciscoanyconnect_secure_mobility_clientMatch2.2.140
OR
ciscoanyconnect_secure_mobility_clientMatch2.3
OR
ciscoanyconnect_secure_mobility_clientMatch2.3.185
OR
ciscoanyconnect_secure_mobility_clientMatch2.3.254
OR
ciscoanyconnect_secure_mobility_clientMatch2.3.2016
OR
ciscoanyconnect_secure_mobility_clientMatch2.4
OR
ciscoanyconnect_secure_mobility_clientMatch2.4symbian_os
OR
ciscoanyconnect_secure_mobility_clientMatch2.4.0202
OR
ciscoanyconnect_secure_mobility_clientMatch2.4.1012
OR
ciscoanyconnect_secure_mobility_clientMatch2.4.4004iphone_os
OR
ciscoanyconnect_secure_mobility_clientMatch2.4.4014iphone_os
OR
ciscoanyconnect_secure_mobility_clientMatch2.4.5004symbian_os
OR
ciscoanyconnect_secure_mobility_clientMatch2.4.7030android
OR
ciscoanyconnect_secure_mobility_clientMatch2.4.7073android
OR
ciscoanyconnect_secure_mobility_clientMatch2.5
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.0217
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.1025
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.2001
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.2006
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.2010
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.2011
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.2014
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.2017
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.2018
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.2019
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.3041
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.3046
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.3051
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.3054
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.3055
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.5112iphone_os
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.5116android
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.5118android
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.5125android
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.5130iphone_os
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.5131android
OR
ciscoanyconnect_secure_mobility_clientMatch2.5.6005

7.7 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.833 High

EPSS

Percentile

98.4%

Related for CVE-2013-5559