Vulnerability Name:

CVE-2013-5959 (CCN-87448)

Assigned:2013-09-23
Published:2013-09-23
Updated:2013-10-11
Summary:Blue Coat ProxySG before 6.2.14.1, 6.3.x, 6.4.x, and 6.5 before 6.5.2 allows remote attackers to cause a denial of service (memory consumption and dropped connections) via a recursive href in an HTML page, which triggers a large number of HTTP RW pipeline pre-fetch requests.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C)
5.6 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2013-5959

Source: OSVDB
Type: UNKNOWN
97767

Source: CCN
Type: SA54991
Blue Coat ProxySG / Security Gateway OS (SGOS) HTTP RW Pipeline Pre-fetch Requests Handling Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
54991

Source: CCN
Type: BID-62647
Blue Coat ProxySG and Security Gateway OS Denial Of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1029088

Source: XF
Type: UNKNOWN
proxysg-pipeline-dos(87448)

Source: CCN
Type: Blue Coat Security Advisory SA75
Recursive HTTP pipeline pre-fetch can cause memory regulation

Source: CONFIRM
Type: Vendor Advisory
https://kb.bluecoat.com/index?page=content&id=SA75

Vulnerable Configuration:Configuration 1:
  • cpe:/a:bluecoat:proxysgos:5.4:*:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:proxysg:*:*:*:*:*:*:*:* (Version <= 5.3)
  • OR cpe:/o:bluecoat:proxysgos:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:proxysgos:5.5:*:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:proxysgos:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:proxysgos:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:proxysgos:6.3:*:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:proxysgos:6.4:*:*:*:*:*:*:*
  • OR cpe:/o:bluecoat:proxysgos:6.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    bluecoat proxysgos 5.4
    bluecoat proxysg *
    bluecoat proxysgos 5.3
    bluecoat proxysgos 5.5
    bluecoat proxysgos 6.1
    bluecoat proxysgos 6.2
    bluecoat proxysgos 6.3
    bluecoat proxysgos 6.4
    bluecoat proxysgos 6.5