Vulnerabilites related to bluecoat - proxysgos
Vulnerability from fkie_nvd
Published
2013-09-28 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Blue Coat ProxySG before 6.2.14.1, 6.3.x, 6.4.x, and 6.5 before 6.5.2 allows remote attackers to cause a denial of service (memory consumption and dropped connections) via a recursive href in an HTML page, which triggers a large number of HTTP RW pipeline pre-fetch requests.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluecoat:proxysgos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "9D56D1F0-B483-4786-9335-7C4CF4B9CA26", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysg:*:*:*:*:*:*:*:*", "matchCriteriaId": "3786BBEA-133D-43CC-A06F-B902283963DC", "versionEndIncluding": "5.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "99D7BC17-0195-4920-A650-16505DE006EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "402CC761-1545-42F8-930C-D6E0EFE5390F", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "25371385-7D35-4101-B8E0-56037E4C00DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "8BBF5F00-F29F-4997-A130-6981A0B795F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "F750EA19-F0BD-4B43-9DE9-9EA041DF12C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "B83B022D-F015-4193-B98D-9E722387ACE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF04DE9E-28DF-4057-8555-C9B8975DB264", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Blue Coat ProxySG before 6.2.14.1, 6.3.x, 6.4.x, and 6.5 before 6.5.2 allows remote attackers to cause a denial of service (memory consumption and dropped connections) via a recursive href in an HTML page, which triggers a large number of HTTP RW pipeline pre-fetch requests." }, { "lang": "es", "value": "Blue Coat ProxySG anteriores a 6.2.14.1, 6.3.x, 6.4.x, y 6.5 (anteriores a 6.5.2) permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria y conexiones interrumpidas) a trav\u00e9s de un href recursivo en una p\u00e1gina HTML, lo que dispara un n\u00famero elevado de peticiones pipeline pre-fetch HTTP RW." } ], "id": "CVE-2013-5959", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-28T19:55:03.243", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/97767" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54991" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029088" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/97767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA75" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-02 17:55
Modified
2025-04-12 10:46
Severity ?
Summary
The caching feature in SGOS in Blue Coat ProxySG 5.5 through 5.5.11.3, 6.1 through 6.1.6.3, 6.2 through 6.2.15.3, 6.4 through 6.4.6.1, and 6.3 and 6.5 before 6.5.4 allows remote authenticated users to bypass intended access restrictions during a time window after account deletion or modification by leveraging knowledge of previously valid credentials.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.kb.cert.org/vuls/id/221620 | US Government Resource | |
cve@mitre.org | https://kb.bluecoat.com/index?page=content&id=SA77 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/221620 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.bluecoat.com/index?page=content&id=SA77 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bluecoat:proxysgos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFC09402-BB52-4A29-8875-80CD3702F15C", "versionEndIncluding": "5.5.11.3", "versionStartIncluding": "5.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:*:*:*:*:*:*:*:*", "matchCriteriaId": "A19413F5-6223-4D98-B2E4-9BA73175DC45", "versionEndIncluding": "6.1.6.3", "versionStartIncluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:*:*:*:*:*:*:*:*", "matchCriteriaId": "3511EC7D-9A5B-4867-A987-98AE342D486F", "versionEndIncluding": "6.2.15.3", "versionStartIncluding": "6.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE01D1A6-31D0-499D-ACF0-22E7CB022D5C", "versionEndIncluding": "6.4.6.1", "versionStartIncluding": "6.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED0D8A5F-0DE5-448D-A4F2-7D64214269EF", "versionEndExcluding": "6.5.4", "versionStartIncluding": "6.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:bluecoat:proxysgos:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "F750EA19-F0BD-4B43-9DE9-9EA041DF12C2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The caching feature in SGOS in Blue Coat ProxySG 5.5 through 5.5.11.3, 6.1 through 6.1.6.3, 6.2 through 6.2.15.3, 6.4 through 6.4.6.1, and 6.3 and 6.5 before 6.5.4 allows remote authenticated users to bypass intended access restrictions during a time window after account deletion or modification by leveraging knowledge of previously valid credentials." }, { "lang": "es", "value": "La funcionalidad de cacheo en SGOS en Blue Coat ProxySG 5.5 hasta 5.5.11.3, 6.1 hasta 6.1.6.3, 6.2 hasta 6.2.15.3, 6.4 hasta 6.4.6.1 y 6.3 y 6.5 anterior a 6.5.4 permite a usuarios remotos autenticados evadir restricciones de acceso durante una ventana de tiempo despu\u00e9s del borrado o modificaci\u00f3n de cuenta mediante el aprovechamiento de conocimiento de credenciales anteriormente validos." } ], "id": "CVE-2014-2033", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-02T17:55:02.893", "references": [ { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/221620" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA77" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/221620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA77" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2013-5959 (GCVE-0-2013-5959)
Vulnerability from cvelistv5
Published
2013-09-28 19:00
Modified
2024-08-06 17:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Blue Coat ProxySG before 6.2.14.1, 6.3.x, 6.4.x, and 6.5 before 6.5.2 allows remote attackers to cause a denial of service (memory consumption and dropped connections) via a recursive href in an HTML page, which triggers a large number of HTTP RW pipeline pre-fetch requests.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:29:41.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54991", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54991" }, { "name": "97767", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/97767" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA75" }, { "name": "1029088", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029088" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Blue Coat ProxySG before 6.2.14.1, 6.3.x, 6.4.x, and 6.5 before 6.5.2 allows remote attackers to cause a denial of service (memory consumption and dropped connections) via a recursive href in an HTML page, which triggers a large number of HTTP RW pipeline pre-fetch requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-11T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "54991", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54991" }, { "name": "97767", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/97767" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA75" }, { "name": "1029088", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029088" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5959", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Blue Coat ProxySG before 6.2.14.1, 6.3.x, 6.4.x, and 6.5 before 6.5.2 allows remote attackers to cause a denial of service (memory consumption and dropped connections) via a recursive href in an HTML page, which triggers a large number of HTTP RW pipeline pre-fetch requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54991", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54991" }, { "name": "97767", "refsource": "OSVDB", "url": "http://osvdb.org/97767" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA75", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA75" }, { "name": "1029088", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029088" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-5959", "datePublished": "2013-09-28T19:00:00", "dateReserved": "2013-09-28T00:00:00", "dateUpdated": "2024-08-06T17:29:41.650Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2033 (GCVE-0-2014-2033)
Vulnerability from cvelistv5
Published
2014-03-02 17:00
Modified
2024-08-06 09:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The caching feature in SGOS in Blue Coat ProxySG 5.5 through 5.5.11.3, 6.1 through 6.1.6.3, 6.2 through 6.2.15.3, 6.4 through 6.4.6.1, and 6.3 and 6.5 before 6.5.4 allows remote authenticated users to bypass intended access restrictions during a time window after account deletion or modification by leveraging knowledge of previously valid credentials.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:58:16.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#221620", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/221620" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA77" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The caching feature in SGOS in Blue Coat ProxySG 5.5 through 5.5.11.3, 6.1 through 6.1.6.3, 6.2 through 6.2.15.3, 6.4 through 6.4.6.1, and 6.3 and 6.5 before 6.5.4 allows remote authenticated users to bypass intended access restrictions during a time window after account deletion or modification by leveraging knowledge of previously valid credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-02T16:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#221620", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/221620" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA77" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The caching feature in SGOS in Blue Coat ProxySG 5.5 through 5.5.11.3, 6.1 through 6.1.6.3, 6.2 through 6.2.15.3, 6.4 through 6.4.6.1, and 6.3 and 6.5 before 6.5.4 allows remote authenticated users to bypass intended access restrictions during a time window after account deletion or modification by leveraging knowledge of previously valid credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#221620", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/221620" }, { "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA77", "refsource": "CONFIRM", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA77" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2033", "datePublished": "2014-03-02T17:00:00", "dateReserved": "2014-02-19T00:00:00", "dateUpdated": "2024-08-06T09:58:16.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }