ID
VAR-E-201209-0720
CVE
cve_id: | CVE-2012-3949 | Trust: 0.3 |
TITLE
Cisco IOS and Unified Communications Manager (CVE-2012-3949) Denial of Service Vulnerability
Trust: 0.3
DESCRIPTION
Cisco IOS and Unified Communications Manager are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the affected device to reload, denying service to legitimate users.
This issue is tracked by Cisco Bug IDs CSCtj33003, CSCtw84664, and CSCtw66721.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | cisco | model: | unified communications manager 7.1 | scope: | - | version: | - | Trust: 1.8 |
vendor: | cisco | model: | unified communications manager 7.1 su1 | scope: | - | version: | - | Trust: 1.5 |
vendor: | cisco | model: | unified communications manager 7.1 su2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | unified communications manager 7.1 su1a | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | unified communications manager 7.0 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | unified communications manager 7.0 su1 | scope: | - | version: | - | Trust: 0.6 |
vendor: | cisco | model: | unified communications manager | scope: | eq | version: | 8.6 | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager 8.5 su2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager 8.5 su1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager | scope: | eq | version: | 8.5(1) | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager | scope: | eq | version: | 8.5 | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager 7.1 su4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager 7.1 su3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager | scope: | eq | version: | 7.1(5) | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager | scope: | eq | version: | 7.1(3) | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager | scope: | eq | version: | 7.1(2) | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager 7.0 su3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager 7.0 su2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager | scope: | eq | version: | 7.0(2) | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager 7.0 su1a | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2gc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 t1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.2 t2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1m | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.1gc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 15.0m | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4yb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4ya | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.4xv | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xm | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4mrb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4mr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.4gc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios t10 | scope: | eq | version: | 12.4 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3za | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ys | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3ym | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3yf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xy | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3xx | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xw | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xu | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xr | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xq | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xl | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xi | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xg | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xf | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xe | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xd | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xb | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3xa | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3jk | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.3b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zp | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zj | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zh | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2ze | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2zc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yt | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2yc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2t | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2mc | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2cz | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2bx | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | ios 12.2b | scope: | - | version: | - | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager 8.6 su1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | cisco | model: | unified communications manager 7.1 su5 | scope: | ne | version: | - | Trust: 0.3 |
EXPLOIT
To exploit this issue, attackers can use readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
Cisco
Trust: 0.3
EXTERNAL IDS
db: | NVD | id: | CVE-2012-3949 | Trust: 0.3 |
db: | BID | id: | 55697 | Trust: 0.3 |
REFERENCES
url: | http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html | Trust: 0.3 |
url: | http://www.cisco.com/en/us/products/sw/voicesw/ps556/ | Trust: 0.3 |
SOURCES
db: | BID | id: | 55697 |
LAST UPDATE DATE
2022-07-27T09:45:19.676000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 55697 | date: | 2015-03-19T09:39:00 |
SOURCES RELEASE DATE
db: | BID | id: | 55697 | date: | 2012-09-26T00:00:00 |