All the vulnerabilites related to cisco - ips_4260
Vulnerability from fkie_nvd
Published
2012-09-16 10:34
Modified
2024-11-21 01:41
Severity ?
Summary
sensorApp on Cisco IPS 4200 series sensors 6.0, 6.2, and 7.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and process crash, and traffic-inspection outage) via network traffic, aka Bug ID CSCtn23051.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | intrusion_prevention_system | 6.0 | |
cisco | intrusion_prevention_system | 6.2 | |
cisco | intrusion_prevention_system | 7.0 | |
cisco | ips_4240 | * | |
cisco | ips_4250_sx | * | |
cisco | ips_4255 | * | |
cisco | ips_4260 | * | |
cisco | ips_4270-20 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B010D14A-7275-454B-B2F8-31EE0D34C24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B235817-21BA-40AF-AC39-7343007ABF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "03105E7F-12F8-4497-8A27-BD2F1653FD38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ips_4240:*:*:*:*:*:*:*:*", "matchCriteriaId": "661A7A3E-09E3-44DA-AEB5-8021BCEF30EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ips_4250_sx:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC8C8063-E6F7-44AB-8FCB-2FDCBE54CBF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ips_4255:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A2BCB3B-CE33-4B96-A125-8E7001845A5C", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ips_4260:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C3637DA-60C8-4F15-8906-F67ADA344A18", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ips_4270-20:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9F6387E-B7DF-4146-B24F-0D99190FA71B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "sensorApp on Cisco IPS 4200 series sensors 6.0, 6.2, and 7.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and process crash, and traffic-inspection outage) via network traffic, aka Bug ID CSCtn23051." }, { "lang": "es", "value": "sensorApp en Cisco IPS serie 4200 sensores v6.0, v6.2, y v7.0 no direcciona la memoria de forma adecuada, lo que podr\u00eda permitir a atacantes remotod provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria, ca\u00edda del proceso e inspecci\u00f3n del tr\u00e1fico fuera de rango) a trav\u00e9s del tr\u00e1fico de red, tambi\u00e9n conocido como Bug ID CSCtn23051." } ], "id": "CVE-2012-3899", "lastModified": "2024-11-21T01:41:48.560", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-16T10:34:50.910", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-21 11:59
Modified
2024-11-21 02:23
Severity ?
Summary
Race condition in the SSL implementation on Cisco Intrusion Prevention System (IPS) devices allows remote attackers to cause a denial of service by making many management-interface HTTPS connections during the key-regeneration phase of an upgrade, aka Bug ID CSCui25688.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:ips_sensor_software:7.2\\(1\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "FC0E024F-9E6A-4CC3-AA35-71D919FFE422", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:ips_sensor_software:7.2\\(2\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "EEE4ECF3-881A-43A5-BBE2-4DCACD399EC5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ids_4210:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F16322D-1B9A-4378-8A19-AD108FAC7D07", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ids_4215:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D91EA2-CD3F-4C3C-B052-72ADDE6D79A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ids_4220:*:*:*:*:*:*:*:*", "matchCriteriaId": "56161609-806D-4FF6-9B0B-E2AD491D7066", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ids_4230:*:*:*:*:*:*:*:*", "matchCriteriaId": "E021E32E-F237-4249-BC22-7226FDD158D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ids_4235:*:*:*:*:*:*:*:*", "matchCriteriaId": "909D1328-04C6-4870-B7BA-6ED45F15FF38", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ids_4250:*:*:*:*:*:*:*:*", "matchCriteriaId": "10446949-EDCA-4775-B8CA-AB8FC32B8EF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ids_4250_xl:*:*:*:*:*:*:*:*", "matchCriteriaId": "24ABF6DE-3A80-4D1D-801E-20F5CF26C68A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ips_4240:*:*:*:*:*:*:*:*", "matchCriteriaId": "661A7A3E-09E3-44DA-AEB5-8021BCEF30EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ips_4255:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A2BCB3B-CE33-4B96-A125-8E7001845A5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ips_4260:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C3637DA-60C8-4F15-8906-F67ADA344A18", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ips_4270:*:*:*:*:*:*:*:*", "matchCriteriaId": "78AE85C6-12A9-4FF6-84CD-C9A197A846F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in the SSL implementation on Cisco Intrusion Prevention System (IPS) devices allows remote attackers to cause a denial of service by making many management-interface HTTPS connections during the key-regeneration phase of an upgrade, aka Bug ID CSCui25688." }, { "lang": "es", "value": "Condici\u00f3n de carrera en la implementaci\u00f3n SSL en los dispositivos Cisco Intrusion Prevention System (IPS) permite a atacantes remotos causar una denegaci\u00f3n de servicio al hacer muchas conexiones HTTPS de la interfaz de gesti\u00f3n durante la fase de la regeneraci\u00f3n de claves de una actualizaci\u00f3n, tambi\u00e9n conocido como Bug ID CSCui25688." } ], "id": "CVE-2015-0631", "lastModified": "2024-11-21T02:23:26.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-21T11:59:04.027", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0631" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/72700" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1031780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031780" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-16 10:34
Modified
2024-11-21 01:41
Severity ?
Summary
The updateTime function in sensorApp on Cisco IPS 4200 series sensors 7.0 and 7.1 allows remote attackers to cause a denial of service (process crash and traffic-inspection outage) via network traffic, aka Bug ID CSCta96144.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | intrusion_prevention_system | 7.0 | |
cisco | intrusion_prevention_system | 7.1 | |
cisco | ips_4240 | * | |
cisco | ips_4250_sx | * | |
cisco | ips_4255 | * | |
cisco | ips_4260 | * | |
cisco | ips_4270-20 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "03105E7F-12F8-4497-8A27-BD2F1653FD38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F03BDC3C-E7F1-41C1-B89C-1DB1D3997DC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ips_4240:*:*:*:*:*:*:*:*", "matchCriteriaId": "661A7A3E-09E3-44DA-AEB5-8021BCEF30EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ips_4250_sx:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC8C8063-E6F7-44AB-8FCB-2FDCBE54CBF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ips_4255:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A2BCB3B-CE33-4B96-A125-8E7001845A5C", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ips_4260:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C3637DA-60C8-4F15-8906-F67ADA344A18", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:ips_4270-20:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9F6387E-B7DF-4146-B24F-0D99190FA71B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The updateTime function in sensorApp on Cisco IPS 4200 series sensors 7.0 and 7.1 allows remote attackers to cause a denial of service (process crash and traffic-inspection outage) via network traffic, aka Bug ID CSCta96144." }, { "lang": "es", "value": "La funci\u00f3n updateTime en sensorApp en Cisco IPS serie 4200 sensores v7.0 y v7.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del proceso e inspecci\u00f3n de tr\u00e1fico fuera del rango) a trav\u00e9s de tr\u00e1fico de redes, tambi\u00e9n conocido como Bug ID CSCta96144." } ], "id": "CVE-2012-3901", "lastModified": "2024-11-21T01:41:48.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-16T10:34:50.940", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/docs/security/ips/7.0/release/notes/22789_01.html" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/en/US/docs/security/ips/7.0/release/notes/22789_01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78870" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2015-0631
Vulnerability from cvelistv5
Published
2015-02-21 11:00
Modified
2024-08-06 04:17
Severity ?
EPSS score ?
Summary
Race condition in the SSL implementation on Cisco Intrusion Prevention System (IPS) devices allows remote attackers to cause a denial of service by making many management-interface HTTPS connections during the key-regeneration phase of an upgrade, aka Bug ID CSCui25688.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0631 | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/72700 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1031780 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:17:32.574Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150220 Cisco Intrusion Prevention System Key Regeneration HTTPS Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0631" }, { "name": "72700", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72700" }, { "name": "1031780", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031780" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in the SSL implementation on Cisco Intrusion Prevention System (IPS) devices allows remote attackers to cause a denial of service by making many management-interface HTTPS connections during the key-regeneration phase of an upgrade, aka Bug ID CSCui25688." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-02-27T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20150220 Cisco Intrusion Prevention System Key Regeneration HTTPS Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0631" }, { "name": "72700", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72700" }, { "name": "1031780", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031780" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-0631", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the SSL implementation on Cisco Intrusion Prevention System (IPS) devices allows remote attackers to cause a denial of service by making many management-interface HTTPS connections during the key-regeneration phase of an upgrade, aka Bug ID CSCui25688." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150220 Cisco Intrusion Prevention System Key Regeneration HTTPS Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0631" }, { "name": "72700", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72700" }, { "name": "1031780", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031780" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-0631", "datePublished": "2015-02-21T11:00:00", "dateReserved": "2015-01-07T00:00:00", "dateUpdated": "2024-08-06T04:17:32.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3901
Vulnerability from cvelistv5
Published
2012-09-16 10:00
Modified
2024-08-06 20:21
Severity ?
EPSS score ?
Summary
The updateTime function in sensorApp on Cisco IPS 4200 series sensors 7.0 and 7.1 allows remote attackers to cause a denial of service (process crash and traffic-inspection outage) via network traffic, aka Bug ID CSCta96144.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/en/US/docs/security/ips/7.0/release/notes/22789_01.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78870 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:21:04.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.cisco.com/en/US/docs/security/ips/7.0/release/notes/22789_01.html" }, { "name": "cisco-ips-updatetime-dos(78870)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78870" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The updateTime function in sensorApp on Cisco IPS 4200 series sensors 7.0 and 7.1 allows remote attackers to cause a denial of service (process crash and traffic-inspection outage) via network traffic, aka Bug ID CSCta96144." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.cisco.com/en/US/docs/security/ips/7.0/release/notes/22789_01.html" }, { "name": "cisco-ips-updatetime-dos(78870)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78870" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-3901", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The updateTime function in sensorApp on Cisco IPS 4200 series sensors 7.0 and 7.1 allows remote attackers to cause a denial of service (process crash and traffic-inspection outage) via network traffic, aka Bug ID CSCta96144." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.cisco.com/en/US/docs/security/ips/7.0/release/notes/22789_01.html", "refsource": "CONFIRM", "url": "http://www.cisco.com/en/US/docs/security/ips/7.0/release/notes/22789_01.html" }, { "name": "cisco-ips-updatetime-dos(78870)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78870" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-3901", "datePublished": "2012-09-16T10:00:00", "dateReserved": "2012-07-10T00:00:00", "dateUpdated": "2024-08-06T20:21:04.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3899
Vulnerability from cvelistv5
Published
2012-09-16 10:00
Modified
2024-09-17 00:05
Severity ?
EPSS score ?
Summary
sensorApp on Cisco IPS 4200 series sensors 6.0, 6.2, and 7.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and process crash, and traffic-inspection outage) via network traffic, aka Bug ID CSCtn23051.
References
▼ | URL | Tags |
---|---|---|
http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:21:03.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "sensorApp on Cisco IPS 4200 series sensors 6.0, 6.2, and 7.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and process crash, and traffic-inspection outage) via network traffic, aka Bug ID CSCtn23051." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-16T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2012-3899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sensorApp on Cisco IPS 4200 series sensors 6.0, 6.2, and 7.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and process crash, and traffic-inspection outage) via network traffic, aka Bug ID CSCtn23051." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt", "refsource": "CONFIRM", "url": "http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2012-3899", "datePublished": "2012-09-16T10:00:00Z", "dateReserved": "2012-07-10T00:00:00Z", "dateUpdated": "2024-09-17T00:05:41.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }