The phone-proxy implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0.3.6 and earlier does not properly validate X.509 certificates, which allows remote attackers to cause a denial of service (connection-database corruption) via an invalid entry, aka Bug ID CSCui33299.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Adaptive_security_appliance_software | Cisco | * | 9.0.3(6) (including) |
Adaptive_security_appliance_software | Cisco | 7.0 (including) | 7.0 (including) |
Adaptive_security_appliance_software | Cisco | 7.0(0) (including) | 7.0(0) (including) |
Adaptive_security_appliance_software | Cisco | 7.0(1) (including) | 7.0(1) (including) |
Adaptive_security_appliance_software | Cisco | 7.0(2) (including) | 7.0(2) (including) |
Adaptive_security_appliance_software | Cisco | 7.0(4) (including) | 7.0(4) (including) |
Adaptive_security_appliance_software | Cisco | 7.0(5) (including) | 7.0(5) (including) |
Adaptive_security_appliance_software | Cisco | 7.0(5.2) (including) | 7.0(5.2) (including) |
Adaptive_security_appliance_software | Cisco | 7.0(6) (including) | 7.0(6) (including) |
Adaptive_security_appliance_software | Cisco | 7.0(6.7) (including) | 7.0(6.7) (including) |
Adaptive_security_appliance_software | Cisco | 7.0(7) (including) | 7.0(7) (including) |
Adaptive_security_appliance_software | Cisco | 7.0(8) (including) | 7.0(8) (including) |
Adaptive_security_appliance_software | Cisco | 7.0.1 (including) | 7.0.1 (including) |
Adaptive_security_appliance_software | Cisco | 7.0.1.4 (including) | 7.0.1.4 (including) |
Adaptive_security_appliance_software | Cisco | 7.0.2 (including) | 7.0.2 (including) |
Adaptive_security_appliance_software | Cisco | 7.0.4 (including) | 7.0.4 (including) |
Adaptive_security_appliance_software | Cisco | 7.0.4.3 (including) | 7.0.4.3 (including) |
Adaptive_security_appliance_software | Cisco | 7.0.5 (including) | 7.0.5 (including) |
Adaptive_security_appliance_software | Cisco | 7.0.6 (including) | 7.0.6 (including) |
Adaptive_security_appliance_software | Cisco | 7.0.7 (including) | 7.0.7 (including) |
Adaptive_security_appliance_software | Cisco | 7.0.8 (including) | 7.0.8 (including) |
Adaptive_security_appliance_software | Cisco | 7.0.8-interim (including) | 7.0.8-interim (including) |
Adaptive_security_appliance_software | Cisco | 7.1 (including) | 7.1 (including) |
Adaptive_security_appliance_software | Cisco | 7.1(2) (including) | 7.1(2) (including) |
Adaptive_security_appliance_software | Cisco | 7.1(2.5) (including) | 7.1(2.5) (including) |
Adaptive_security_appliance_software | Cisco | 7.1(2.27) (including) | 7.1(2.27) (including) |
Adaptive_security_appliance_software | Cisco | 7.1(2.48) (including) | 7.1(2.48) (including) |
Adaptive_security_appliance_software | Cisco | 7.1(2.49) (including) | 7.1(2.49) (including) |
Adaptive_security_appliance_software | Cisco | 7.1(5) (including) | 7.1(5) (including) |
Adaptive_security_appliance_software | Cisco | 7.1.1 (including) | 7.1.1 (including) |
Adaptive_security_appliance_software | Cisco | 7.1.2 (including) | 7.1.2 (including) |
Adaptive_security_appliance_software | Cisco | 7.2 (including) | 7.2 (including) |
Adaptive_security_appliance_software | Cisco | 7.2(1) (including) | 7.2(1) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(1.22) (including) | 7.2(1.22) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2) (including) | 7.2(2) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.5) (including) | 7.2(2.5) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.7) (including) | 7.2(2.7) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.8) (including) | 7.2(2.8) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.10) (including) | 7.2(2.10) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.14) (including) | 7.2(2.14) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.15) (including) | 7.2(2.15) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.16) (including) | 7.2(2.16) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.17) (including) | 7.2(2.17) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.18) (including) | 7.2(2.18) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.19) (including) | 7.2(2.19) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(2.48) (including) | 7.2(2.48) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(3) (including) | 7.2(3) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(4) (including) | 7.2(4) (including) |
Adaptive_security_appliance_software | Cisco | 7.2(5) (including) | 7.2(5) (including) |
Adaptive_security_appliance_software | Cisco | 7.2.1 (including) | 7.2.1 (including) |
Adaptive_security_appliance_software | Cisco | 7.2.2 (including) | 7.2.2 (including) |
Adaptive_security_appliance_software | Cisco | 7.2.3 (including) | 7.2.3 (including) |
Adaptive_security_appliance_software | Cisco | 7.2.4 (including) | 7.2.4 (including) |
Adaptive_security_appliance_software | Cisco | 7.2.5 (including) | 7.2.5 (including) |
Adaptive_security_appliance_software | Cisco | 8.0 (including) | 8.0 (including) |
Adaptive_security_appliance_software | Cisco | 8.0(2) (including) | 8.0(2) (including) |
Adaptive_security_appliance_software | Cisco | 8.0(3) (including) | 8.0(3) (including) |
Adaptive_security_appliance_software | Cisco | 8.0(4) (including) | 8.0(4) (including) |
Adaptive_security_appliance_software | Cisco | 8.0(5) (including) | 8.0(5) (including) |
Adaptive_security_appliance_software | Cisco | 8.0(5.28) (including) | 8.0(5.28) (including) |
Adaptive_security_appliance_software | Cisco | 8.0(5.31) (including) | 8.0(5.31) (including) |
Adaptive_security_appliance_software | Cisco | 8.0.2 (including) | 8.0.2 (including) |
Adaptive_security_appliance_software | Cisco | 8.0.3 (including) | 8.0.3 (including) |
Adaptive_security_appliance_software | Cisco | 8.0.4 (including) | 8.0.4 (including) |
Adaptive_security_appliance_software | Cisco | 8.0.5 (including) | 8.0.5 (including) |
Adaptive_security_appliance_software | Cisco | 8.1 (including) | 8.1 (including) |
Adaptive_security_appliance_software | Cisco | 8.2 (including) | 8.2 (including) |
Adaptive_security_appliance_software | Cisco | 8.2(1) (including) | 8.2(1) (including) |
Adaptive_security_appliance_software | Cisco | 8.2(2) (including) | 8.2(2) (including) |
Adaptive_security_appliance_software | Cisco | 8.2(3) (including) | 8.2(3) (including) |
Adaptive_security_appliance_software | Cisco | 8.2(3.9) (including) | 8.2(3.9) (including) |
Adaptive_security_appliance_software | Cisco | 8.2(4) (including) | 8.2(4) (including) |
Adaptive_security_appliance_software | Cisco | 8.2(4.1) (including) | 8.2(4.1) (including) |
Adaptive_security_appliance_software | Cisco | 8.2(4.4) (including) | 8.2(4.4) (including) |
Adaptive_security_appliance_software | Cisco | 8.2(5) (including) | 8.2(5) (including) |
Adaptive_security_appliance_software | Cisco | 8.2(5.35) (including) | 8.2(5.35) (including) |
Adaptive_security_appliance_software | Cisco | 8.2(5.38) (including) | 8.2(5.38) (including) |
Adaptive_security_appliance_software | Cisco | 8.2.1 (including) | 8.2.1 (including) |
Adaptive_security_appliance_software | Cisco | 8.2.2 (including) | 8.2.2 (including) |
Adaptive_security_appliance_software | Cisco | 8.2.2-interim (including) | 8.2.2-interim (including) |
Adaptive_security_appliance_software | Cisco | 8.2.3 (including) | 8.2.3 (including) |
Adaptive_security_appliance_software | Cisco | 8.3(1) (including) | 8.3(1) (including) |
Adaptive_security_appliance_software | Cisco | 8.3(2) (including) | 8.3(2) (including) |
Adaptive_security_appliance_software | Cisco | 8.3(2.34) (including) | 8.3(2.34) (including) |
Adaptive_security_appliance_software | Cisco | 8.3(2.37) (including) | 8.3(2.37) (including) |
Adaptive_security_appliance_software | Cisco | 8.3.1 (including) | 8.3.1 (including) |
Adaptive_security_appliance_software | Cisco | 8.3.1-interim (including) | 8.3.1-interim (including) |
Adaptive_security_appliance_software | Cisco | 8.3.2 (including) | 8.3.2 (including) |
Adaptive_security_appliance_software | Cisco | 8.4 (including) | 8.4 (including) |
Adaptive_security_appliance_software | Cisco | 8.4(1) (including) | 8.4(1) (including) |
Adaptive_security_appliance_software | Cisco | 8.4(1.11) (including) | 8.4(1.11) (including) |
Adaptive_security_appliance_software | Cisco | 8.4(2) (including) | 8.4(2) (including) |
Adaptive_security_appliance_software | Cisco | 8.4(2.11) (including) | 8.4(2.11) (including) |
Adaptive_security_appliance_software | Cisco | 8.4(3) (including) | 8.4(3) (including) |
Adaptive_security_appliance_software | Cisco | 8.4(4.11) (including) | 8.4(4.11) (including) |
Adaptive_security_appliance_software | Cisco | 8.4(5) (including) | 8.4(5) (including) |
Adaptive_security_appliance_software | Cisco | 8.4(6) (including) | 8.4(6) (including) |
Adaptive_security_appliance_software | Cisco | 8.5 (including) | 8.5 (including) |
Adaptive_security_appliance_software | Cisco | 8.5(1) (including) | 8.5(1) (including) |
Adaptive_security_appliance_software | Cisco | 8.5(1.4) (including) | 8.5(1.4) (including) |
Adaptive_security_appliance_software | Cisco | 8.5(1.17) (including) | 8.5(1.17) (including) |
Adaptive_security_appliance_software | Cisco | 8.6 (including) | 8.6 (including) |
Adaptive_security_appliance_software | Cisco | 8.6(1) (including) | 8.6(1) (including) |
Adaptive_security_appliance_software | Cisco | 8.6(1.3) (including) | 8.6(1.3) (including) |
Adaptive_security_appliance_software | Cisco | 8.6(1.10) (including) | 8.6(1.10) (including) |
Adaptive_security_appliance_software | Cisco | 8.7 (including) | 8.7 (including) |
Adaptive_security_appliance_software | Cisco | 8.7(1.1) (including) | 8.7(1.1) (including) |
Adaptive_security_appliance_software | Cisco | 8.7(1.3) (including) | 8.7(1.3) (including) |
Adaptive_security_appliance_software | Cisco | 8.7.1 (including) | 8.7.1 (including) |
Adaptive_security_appliance_software | Cisco | 8.7.1.1 (including) | 8.7.1.1 (including) |
Adaptive_security_appliance_software | Cisco | 9.0 (including) | 9.0 (including) |
Adaptive_security_appliance_software | Cisco | 9.0(1) (including) | 9.0(1) (including) |
Adaptive_security_appliance_software | Cisco | 9.0(2) (including) | 9.0(2) (including) |
Adaptive_security_appliance_software | Cisco | 9.0(3) (including) | 9.0(3) (including) |
Input validation is a frequently-used technique for checking potentially dangerous inputs in order to ensure that the inputs are safe for processing within the code, or when communicating with other components. Input can consist of:
Data can be simple or structured. Structured data can be composed of many nested layers, composed of combinations of metadata and raw data, with other simple or structured data. Many properties of raw data or metadata may need to be validated upon entry into the code, such as:
Implied or derived properties of data must often be calculated or inferred by the code itself. Errors in deriving properties may be considered a contributing factor to improper input validation.