cve-2013-5542
Vulnerability from cvelistv5
Published
2013-10-21 10:00
Modified
2024-09-17 01:21
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.2), 8.7 before 8.7(1.8), 9.0 before 9.0(3.6), and 9.1 before 9.1(2.8) allows remote attackers to cause a denial of service (firewall-session disruption or device reload) via crafted ICMP packets, aka Bug ID CSCui77398.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:15:21.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20131009 Multiple Vulnerabilities in Cisco ASA Software", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.2), 8.7 before 8.7(1.8), 9.0 before 9.0(3.6), and 9.1 before 9.1(2.8) allows remote attackers to cause a denial of service (firewall-session disruption or device reload) via crafted ICMP packets, aka Bug ID CSCui77398." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-21T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20131009 Multiple Vulnerabilities in Cisco ASA Software", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-5542", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.2), 8.7 before 8.7(1.8), 9.0 before 9.0(3.6), and 9.1 before 9.1(2.8) allows remote attackers to cause a denial of service (firewall-session disruption or device reload) via crafted ICMP packets, aka Bug ID CSCui77398." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20131009 Multiple Vulnerabilities in Cisco ASA Software", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-5542", "datePublished": "2013-10-21T10:00:00Z", "dateReserved": "2013-08-22T00:00:00Z", "dateUpdated": "2024-09-17T01:21:13.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F995B807-32A2-401F-99D5-FBBA8B69E844\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84A2E5EC-4480-4E1E-A8EB-82BEAA2CFD5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A044D44-6AF2-4E6D-A3B9-F70951142A68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2738AE0C-1ACE-497A-B674-FAE6EEAE4735\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A46A329-2A39-40D9-9611-397B41E9C78E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\\\(1.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6432F1F9-7EEE-4547-A3D2-ACC18D25F342\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\\\(1.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4FDA1C7-3CFC-4DFC-8DE7-ED54636ED1A0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B64230D9-75E1-40C0-8889-43F1035F5B60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32E62616-5847-459A-A876-D30321EF591B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(1.7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D234DF9-39EB-4AD3-942A-0AED8D11F5D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2B02A8A-4D16-4AB7-896F-50F891956560\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A914DE5-2269-451A-823A-B26AE1A7F980\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69683734-528F-488A-8A90-8478FA27B97E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1.11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"691166C2-1FBD-46EB-8AA5-FCE303444ACD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2.11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4956430E-BEC1-4788-B0D2-E50E36C70306\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0271E71-11A1-410F-A34B-5E90FE009D4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(4.11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"747A3577-3D68-4F23-B465-5A40035C2246\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7DC22FC-55C8-4B87-96BF-BE058E958BB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CA1BFAD-8E5D-439B-9D96-8D930E529608\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.2), 8.7 before 8.7(1.8), 9.0 before 9.0(3.6), and 9.1 before 9.1(2.8) allows remote attackers to cause a denial of service (firewall-session disruption or device reload) via crafted ICMP packets, aka Bug ID CSCui77398.\"}, {\"lang\": \"es\", \"value\": \"Cisco Adaptive Security Appliance (ASA) Software 8.4 antes de 8.4 (7.2) 8.7 antes de 8.7 (1.8) 9.0 antes de 9.0 (3.6) y 9.1 antes de 9.1 (2.8) permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (interrupci\\u00f3n de sesi\\u00f3n de firewall o la recarga del dispositivo) a trav\\u00e9s de paquetes ICMP artesanales, tambi\\u00e9n conocido como Bug ID CSCui77398.\"}]", "id": "CVE-2013-5542", "lastModified": "2024-11-21T01:57:40.270", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:C\", \"baseScore\": 8.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 7.8, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2013-10-21T10:54:30.507", "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2013-5542\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2013-10-21T10:54:30.507\",\"lastModified\":\"2024-11-21T01:57:40.270\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.2), 8.7 before 8.7(1.8), 9.0 before 9.0(3.6), and 9.1 before 9.1(2.8) allows remote attackers to cause a denial of service (firewall-session disruption or device reload) via crafted ICMP packets, aka Bug ID CSCui77398.\"},{\"lang\":\"es\",\"value\":\"Cisco Adaptive Security Appliance (ASA) Software 8.4 antes de 8.4 (7.2) 8.7 antes de 8.7 (1.8) 9.0 antes de 9.0 (3.6) y 9.1 antes de 9.1 (2.8) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (interrupci\u00f3n de sesi\u00f3n de firewall o la recarga del dispositivo) a trav\u00e9s de paquetes ICMP artesanales, tambi\u00e9n conocido como Bug ID CSCui77398.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:C\",\"baseScore\":8.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":7.8,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F995B807-32A2-401F-99D5-FBBA8B69E844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A2E5EC-4480-4E1E-A8EB-82BEAA2CFD5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A044D44-6AF2-4E6D-A3B9-F70951142A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2738AE0C-1ACE-497A-B674-FAE6EEAE4735\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A46A329-2A39-40D9-9611-397B41E9C78E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\\\(1.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6432F1F9-7EEE-4547-A3D2-ACC18D25F342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\\\(1.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FDA1C7-3CFC-4DFC-8DE7-ED54636ED1A0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64230D9-75E1-40C0-8889-43F1035F5B60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E62616-5847-459A-A876-D30321EF591B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(1.7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D234DF9-39EB-4AD3-942A-0AED8D11F5D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2B02A8A-4D16-4AB7-896F-50F891956560\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A914DE5-2269-451A-823A-B26AE1A7F980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69683734-528F-488A-8A90-8478FA27B97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(1.11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691166C2-1FBD-46EB-8AA5-FCE303444ACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(2.11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4956430E-BEC1-4788-B0D2-E50E36C70306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0271E71-11A1-410F-A34B-5E90FE009D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(4.11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747A3577-3D68-4F23-B465-5A40035C2246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DC22FC-55C8-4B87-96BF-BE058E958BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA1BFAD-8E5D-439B-9D96-8D930E529608\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.