ID

VAR-201209-0387


CVE

CVE-2012-3950


TITLE

Cisco IOS of Intrusion Prevention System Service disruption in functionality ( Device reload ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-004638

DESCRIPTION

The Intrusion Prevention System (IPS) feature in Cisco IOS 12.3 through 12.4 and 15.0 through 15.2, in certain configurations of enabled categories and missing signatures, allows remote attackers to cause a denial of service (device reload) via DNS packets, aka Bug ID CSCtw55976. The problem is Bug ID CSCtw55976 It is a problem.By a third party DNS Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco IOS is a popular Internet operating system. This Cisco bug ID is CSCtw55976. An attacker can exploit this issue to cause a device to reload, resulting in a denial-of-service condition. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Cisco IOS Intrusion Prevention System DNS Packet Handling Denial of Service Vulnerability SECUNIA ADVISORY ID: SA50777 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50777/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50777 RELEASE DATE: 2012-09-27 DISCUSS ADVISORY: http://secunia.com/advisories/50777/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50777/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50777 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the Intrusion Prevention System implementation when handling DNS packets and can be exploited to trigger a reload. Please see the vendor's advisory for a list of affected versions. SOLUTION: Update to a fixed version (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ios-ips OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2012-3950 // JVNDB: JVNDB-2012-004638 // CNVD: CNVD-2012-5479 // BID: 55695 // VULHUB: VHN-57231 // PACKETSTORM: 116991

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-5479

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.4 t1scope: - version: -

Trust: 2.7

vendor:ciscomodel:ios 12.4 t2scope: - version: -

Trust: 2.7

vendor:ciscomodel:ios 12.4 tscope: - version: -

Trust: 2.7

vendor:ciscomodel:ios 12.4 mrscope: - version: -

Trust: 2.1

vendor:ciscomodel:ios 12.4 t4scope: - version: -

Trust: 2.1

vendor:ciscomodel:ios 12.4 t3scope: - version: -

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.3\(15\)

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)yu

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)yu1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)yt

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)t5

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)yt1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)yq1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3\(16\)

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)yq3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)yq4

Trust: 1.6

vendor:ciscomodel:ios 12.4 t5scope: - version: -

Trust: 1.5

vendor:ciscomodel:ios 12.4 t6scope: - version: -

Trust: 1.5

vendor:ciscomodel:ios 12.4 t7scope: - version: -

Trust: 1.5

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 1.3

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4ja

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(3\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(10d\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4jdd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xd2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)eo1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(24\)md1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(6e\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(6a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(24\)md2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(4\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(12\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4md

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xa4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5a\)b5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(23\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(6\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(1\)se

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(1a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xk1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yf2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mda

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(13a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(9a\)bc7

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3bw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xm

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)ja5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3jeb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3jed

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)xu2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(10c\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(3d\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)jx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4jl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)xy5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(15\)md

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yf3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)ja1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3jec

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(1c\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(15b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(6\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5f\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3jea

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)mr1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xd1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)t8

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(24\)md3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xc4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)t8

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)t9

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yg3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3tpc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(3h\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(3\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)xl3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(13a\)bc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(8\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)t4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mdb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)t5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xs

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xe4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(9e\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)xr4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4jdc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)xi7

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(1b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ys

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)t10

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5a\)b

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(4\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)ja1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)t3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(5b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)t4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)jk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ja

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(9a\)bc6

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)xi4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)t12

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4ye

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3jk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7.7\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)t4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mra

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yf

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xv

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(24\)t1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xp

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xc3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)t9

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(11\)md

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yf4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)ja

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yi1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)t9

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4jma

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xg1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xq1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)t2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yk1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(4\)mr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)t3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)yq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xc1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xg2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4jx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(7\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(12b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)xr6

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(24\)md4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)t7

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)t8

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)ys1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5e\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)t4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yi3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(5\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)jk1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ym

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(3e\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)ja1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xe3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3jx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4yb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(3b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)xy6

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)ja

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(9d\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(10e\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(10\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(22\)mda

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4yg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(22\)md

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xe4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)tpc11a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(6f\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ye

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yu

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4gc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xg5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xy

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)xl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(3i\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xa5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)xc2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(9a\)bc2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3j

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xk3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)t1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(9\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xk4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(13\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(13a\)bc1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(3a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)xr3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(24\)md

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(9\)t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4jda

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4jk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)xy4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yg2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)ys

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xh

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5a\)b2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ya

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)xb2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(6\)t1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(2\)ja

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3jl

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3va

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(7\)xi3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xe

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3bc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3za

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(12e\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5c\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4yd

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)xg4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4jmb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(4\)t8

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xn

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5\)b1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)t11

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(14\)ym4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yk2

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(7a\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3xw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)yg1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(2\)mr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)t4

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(9a\)bc

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(5b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(6d\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)t6

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4\(24\)mda

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)t8

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(11\)yw

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)ja

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(13b\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3\(8\)ya1

Trust: 1.0

vendor:ciscomodel:ios 12.4 t8scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.4 mr1scope: - version: -

Trust: 0.9

vendor:ciscomodel:iosscope:eqversion:12.3 to 12.4

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0 to 15.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.3-12.4

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.0-15.2

Trust: 0.6

vendor:ciscomodel:ios 12.3 jkscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 jascope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t17scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t12scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ja1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ja6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 t2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ja2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t16scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t10scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jk1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jk3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 mr1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ja2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t15scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ja5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t9scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jk1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0 m1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios tscope:eqversion:12.4

Trust: 0.3

sources: CNVD: CNVD-2012-5479 // BID: 55695 // JVNDB: JVNDB-2012-004638 // CNNVD: CNNVD-201209-609 // NVD: CVE-2012-3950

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3950
value: HIGH

Trust: 1.0

NVD: CVE-2012-3950
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201209-609
value: HIGH

Trust: 0.6

VULHUB: VHN-57231
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-3950
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-57231
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57231 // JVNDB: JVNDB-2012-004638 // CNNVD: CNNVD-201209-609 // NVD: CVE-2012-3950

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-57231 // JVNDB: JVNDB-2012-004638 // NVD: CVE-2012-3950

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-609

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201209-609

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004638

PATCH

title:cisco-sa-20120926-ios-ipsurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ios-ips

Trust: 0.8

title:cisco-sa-20120926-ios-ipsurl:http://www.cisco.com/cisco/web/support/JP/111/1116/1116608_cisco-sa-20120926-ios-ips-j.html

Trust: 0.8

title:Patch for Cisco IOS Remote Denial of Service Vulnerability (CNVD-2012-5479)url:https://www.cnvd.org.cn/patchInfo/show/23313

Trust: 0.6

sources: CNVD: CNVD-2012-5479 // JVNDB: JVNDB-2012-004638

EXTERNAL IDS

db:NVDid:CVE-2012-3950

Trust: 3.4

db:BIDid:55695

Trust: 1.4

db:SECUNIAid:50777

Trust: 1.2

db:SECTRACKid:1027580

Trust: 1.1

db:JVNDBid:JVNDB-2012-004638

Trust: 0.8

db:CNNVDid:CNNVD-201209-609

Trust: 0.7

db:CNVDid:CNVD-2012-5479

Trust: 0.6

db:NSFOCUSid:20885

Trust: 0.6

db:CISCOid:20120926 CISCO IOS SOFTWARE INTRUSION PREVENTION SYSTEM DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-57231

Trust: 0.1

db:PACKETSTORMid:116991

Trust: 0.1

sources: CNVD: CNVD-2012-5479 // VULHUB: VHN-57231 // BID: 55695 // JVNDB: JVNDB-2012-004638 // PACKETSTORM: 116991 // CNNVD: CNNVD-201209-609 // NVD: CVE-2012-3950

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120926-ios-ips

Trust: 2.7

url:http://www.securityfocus.com/bid/55695

Trust: 1.1

url:http://www.securitytracker.com/id?1027580

Trust: 1.1

url:http://secunia.com/advisories/50777

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/78882

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3950

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3950

Trust: 0.8

url:http://www.nsfocus.net/vulndb/20885

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/50777/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50777

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/50777/#comments

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-5479 // VULHUB: VHN-57231 // BID: 55695 // JVNDB: JVNDB-2012-004638 // PACKETSTORM: 116991 // CNNVD: CNNVD-201209-609 // NVD: CVE-2012-3950

CREDITS

Cisco

Trust: 0.3

sources: BID: 55695

SOURCES

db:CNVDid:CNVD-2012-5479
db:VULHUBid:VHN-57231
db:BIDid:55695
db:JVNDBid:JVNDB-2012-004638
db:PACKETSTORMid:116991
db:CNNVDid:CNNVD-201209-609
db:NVDid:CVE-2012-3950

LAST UPDATE DATE

2025-04-11T23:03:01.983000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-5479date:2012-09-28T00:00:00
db:VULHUBid:VHN-57231date:2017-08-29T00:00:00
db:BIDid:55695date:2015-03-19T09:28:00
db:JVNDBid:JVNDB-2012-004638date:2012-09-28T00:00:00
db:CNNVDid:CNNVD-201209-609date:2012-09-27T00:00:00
db:NVDid:CVE-2012-3950date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-5479date:2012-09-28T00:00:00
db:VULHUBid:VHN-57231date:2012-09-27T00:00:00
db:BIDid:55695date:2012-09-26T00:00:00
db:JVNDBid:JVNDB-2012-004638date:2012-09-28T00:00:00
db:PACKETSTORMid:116991date:2012-09-28T05:16:29
db:CNNVDid:CNNVD-201209-609date:2012-09-27T00:00:00
db:NVDid:CVE-2012-3950date:2012-09-27T00:55:00.857