ID

VAR-E-201210-0457


CVE

cve_id:CVE-2012-4661

Trust: 0.3

sources: BID: 55863

TITLE

Multiple Cisco Products CVE-2012-4661 Buffer Overflow Vulnerability

Trust: 0.3

sources: BID: 55863

DESCRIPTION

Multiple Cisco products are prone to a buffer-overflow vulnerability.
This issue is being tracked by Cisco Bug ID CSCtr21359.
Attackers can exploit this issue to execute arbitrary command within the context of the affected application. Failed exploit attempts will result in denial-of-service conditions.
The following products are affected:
Cisco Firewall Services Module (FWSM)
Cisco ASA 5500 Series Adaptive Security Appliances
Cisco Catalyst 6500 Series ASA Services Module

Trust: 0.3

sources: BID: 55863

AFFECTED PRODUCTS

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4(2.7)

Trust: 0.9

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.5(1.1)

Trust: 0.6

vendor:ciscomodel:firewall services modulescope:eqversion:4.1(5)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:4.1(1.2)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:4.1(1.1)

Trust: 0.3

vendor:ciscomodel:firewall service modulescope:eqversion:4.1(7)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.6(1.1)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.5(1.6)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.5(1.4)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.5(1.2)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.5

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.4(3)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.4(2.5)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.4(2.11)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.4(2.1)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.4

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.3(2.29)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.3(2.25)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.3(2.22)

Trust: 0.3

vendor:ciscomodel:catalyst series asa services modulescope:eqversion:65008.3

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.6(1.1)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.6

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.5(1.6)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.5(1.4)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.5(1.2)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.5

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4(3)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4(2.5)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4(2.16)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4(2.11)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4(2.1)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4(2)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4(1.10)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4(1)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.4

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(2.29)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(2.28)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(2.25)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(2.23)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(2.22)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(2.20)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(2.18)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(2.13)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(2)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(1.8)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(1.6)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(1.1)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3(0.08)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.3

Trust: 0.3

sources: BID: 55863

EXPLOIT

To exploit this issue, attackers can use readily available network utilities.

Trust: 0.3

sources: BID: 55863

PRICE

Free

Trust: 0.3

sources: BID: 55863

TYPE

Design Error

Trust: 0.3

sources: BID: 55863

CREDITS

Cisco

Trust: 0.3

sources: BID: 55863

EXTERNAL IDS

db:NVDid:CVE-2012-4661

Trust: 0.3

db:BIDid:55863

Trust: 0.3

sources: BID: 55863

REFERENCES

url:http://www.cisco.com/

Trust: 0.3

sources: BID: 55863

SOURCES

db:BIDid:55863

LAST UPDATE DATE

2022-07-27T09:42:55.871000+00:00


SOURCES UPDATE DATE

db:BIDid:55863date:2012-10-10T00:00:00

SOURCES RELEASE DATE

db:BIDid:55863date:2012-10-10T00:00:00