ID

VAR-E-201209-0720


CVE

cve_id:CVE-2012-3949

Trust: 0.3

sources: BID: 55697

TITLE

Cisco IOS and Unified Communications Manager (CVE-2012-3949) Denial of Service Vulnerability

Trust: 0.3

sources: BID: 55697

DESCRIPTION

Cisco IOS and Unified Communications Manager are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause the affected device to reload, denying service to legitimate users.
This issue is tracked by Cisco Bug IDs CSCtj33003, CSCtw84664, and CSCtw66721.

Trust: 0.3

sources: BID: 55697

AFFECTED PRODUCTS

vendor:ciscomodel:unified communications manager 7.1scope: - version: -

Trust: 1.8

vendor:ciscomodel:unified communications manager 7.1 su1scope: - version: -

Trust: 1.5

vendor:ciscomodel:unified communications manager 7.1 su2scope: - version: -

Trust: 0.6

vendor:ciscomodel:unified communications manager 7.1 su1ascope: - version: -

Trust: 0.6

vendor:ciscomodel:unified communications manager 7.0scope: - version: -

Trust: 0.6

vendor:ciscomodel:unified communications manager 7.0 su1scope: - version: -

Trust: 0.6

vendor:ciscomodel:unified communications managerscope:eqversion:8.6

Trust: 0.3

vendor:ciscomodel:unified communications manager 8.5 su2scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 8.5 su1scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:8.5(1)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:8.5

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1 su4scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1 su3scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(5)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(3)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0 su3scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0 su2scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.0(2)

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.0 su1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:ios 15.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios t10scope:eqversion:12.4

Trust: 0.3

vendor:ciscomodel:ios 12.3zascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2mcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 8.6 su1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:unified communications manager 7.1 su5scope:neversion: -

Trust: 0.3

sources: BID: 55697

EXPLOIT

To exploit this issue, attackers can use readily available network utilities.

Trust: 0.3

sources: BID: 55697

PRICE

Free

Trust: 0.3

sources: BID: 55697

TYPE

Design Error

Trust: 0.3

sources: BID: 55697

CREDITS

Cisco

Trust: 0.3

sources: BID: 55697

EXTERNAL IDS

db:NVDid:CVE-2012-3949

Trust: 0.3

db:BIDid:55697

Trust: 0.3

sources: BID: 55697

REFERENCES

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/voicesw/ps556/

Trust: 0.3

sources: BID: 55697

SOURCES

db:BIDid:55697

LAST UPDATE DATE

2022-07-27T09:45:19.676000+00:00


SOURCES UPDATE DATE

db:BIDid:55697date:2015-03-19T09:39:00

SOURCES RELEASE DATE

db:BIDid:55697date:2012-09-26T00:00:00