29/5/2014
6/8/2024
CVE-2014-3285: Input Validation
First published: Thu May 29 2014(Updated: )
Cisco Wide Area Application Services (WAAS) 5.3(.5a) and earlier, when SharePoint acceleration is enabled, does not properly parse SharePoint responses, which allows remote attackers to cause a denial of service (application-optimization handler reload) via a crafted SharePoint application, aka Bug ID CSCue47674.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|
Cisco Wide Area Application Services | <=5.3\(.5a\) | |
Cisco Wide Area Application Services | =5.1 | |
Cisco Wide Area Application Services | =5.1\(.1\) | |
Cisco Wide Area Application Services | =5.1\(.1a\) | |
Cisco Wide Area Application Services | =5.1\(.1b\) | |
Cisco Wide Area Application Services | =5.1\(.1c\) | |
Cisco Wide Area Application Services | =5.1\(.1d\) | |
Cisco Wide Area Application Services | =5.1\(.1e\) | |
Cisco Wide Area Application Services | =5.1\(.1f\) | |
Cisco Wide Area Application Services | =5.2 | |
Cisco Wide Area Application Services | =5.2\(.1\) | |
Cisco Wide Area Application Services | =5.3 | |
Cisco Wide Area Application Services | =5.3\(.1\) | |
Cisco Wide Area Application Services | =5.3\(.3\) | |
Cisco Wide Area Application Services | =5.3\(.5\) | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2014-3285?
CVE-2014-3285 has a severity rating that indicates it can cause a denial of service for affected systems.
How do I fix CVE-2014-3285?
To mitigate CVE-2014-3285, upgrade the Cisco Wide Area Application Services to a non-vulnerable version.
Which versions of Cisco Wide Area Application Services are affected by CVE-2014-3285?
CVE-2014-3285 affects versions 5.3(.5a) and earlier of Cisco Wide Area Application Services.
What type of attack does CVE-2014-3285 facilitate?
CVE-2014-3285 allows remote attackers to execute a denial of service attack by submitting a crafted SharePoint application.
Is there a workaround available for CVE-2014-3285?
There are no specific workarounds suggested for CVE-2014-3285; upgrading to a patched version is recommended.
- collector/nvd-index
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/severity
- agent/last-modified-date
- agent/author
- agent/weakness
- agent/references
- agent/tags
- agent/first-publish-date
- agent/event
- agent/description
- agent/source
- vendor/cisco
- canonical/cisco wide area application services
- version/cisco wide area application services/5.3\(.5a\)
- version/cisco wide area application services/5.1
- version/cisco wide area application services/5.1\(.1\)
- version/cisco wide area application services/5.1\(.1a\)
- version/cisco wide area application services/5.1\(.1b\)
- version/cisco wide area application services/5.1\(.1c\)
- version/cisco wide area application services/5.1\(.1d\)
- version/cisco wide area application services/5.1\(.1e\)
- version/cisco wide area application services/5.1\(.1f\)
- version/cisco wide area application services/5.2
- version/cisco wide area application services/5.2\(.1\)
- version/cisco wide area application services/5.3
- version/cisco wide area application services/5.3\(.1\)
- version/cisco wide area application services/5.3\(.3\)
- version/cisco wide area application services/5.3\(.5\)
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203