var-201304-0035
Vulnerability from variot
Race condition on Cisco Adaptive Security Appliances (ASA) devices allows remote attackers to cause a denial of service (CPU consumption or device reload) by establishing multiple connections, leading to improper handling of hash lookups for secondary flows, aka Bug IDs CSCue31622 and CSCuc71272. Cisco Adaptive Security Appliance is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause CPU exhaustion and reload an affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCue31622 and CSCuc71272
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0035", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "5500 series adaptive security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2" }, { "model": "5500 adaptive security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2" }, { "model": "adaptive security appliance", "scope": null, "trust": 1.4, "vendor": "cisco", "version": null }, { "model": "adaptive security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "5500 series adaptive security appliance", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "adaptive security appliance 5500 series", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "none" }, { "model": "adaptive security appliance 5500 series", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.2" }, { "model": "5500 series adaptive security appliance", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "asa series adaptive security appliances", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "55000" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "55007.2.2" }, { "model": "asa series adaptive security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "55007.2" }, { "model": "adaptive security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "BID", "id": "59256" }, { "db": "JVNDB", "id": "JVNDB-2013-002243" }, { "db": "NVD", "id": "CVE-2012-5415" }, { "db": "CNNVD", "id": "CNNVD-201304-229" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:5500_adaptive_security_appliance:7.2:2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-5415" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "59256" } ], "trust": 0.3 }, "cve": "CVE-2012-5415", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 5.4, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 5.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-5415", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 5.4, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "id": "VHN-58696", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-5415", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201304-229", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-58696", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-58696" }, { "db": "JVNDB", "id": "JVNDB-2013-002243" }, { "db": "NVD", "id": "CVE-2012-5415" }, { "db": "CNNVD", "id": "CNNVD-201304-229" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Race condition on Cisco Adaptive Security Appliances (ASA) devices allows remote attackers to cause a denial of service (CPU consumption or device reload) by establishing multiple connections, leading to improper handling of hash lookups for secondary flows, aka Bug IDs CSCue31622 and CSCuc71272. Cisco Adaptive Security Appliance is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause CPU exhaustion and reload an affected device, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug IDs CSCue31622 and CSCuc71272", "sources": [ { "db": "NVD", "id": "CVE-2012-5415" }, { "db": "JVNDB", "id": "JVNDB-2013-002243" }, { "db": "BID", "id": "59256" }, { "db": "VULHUB", "id": "VHN-58696" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-5415", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2013-002243", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201304-229", "trust": 0.7 }, { "db": "CISCO", "id": "20130411 SECONDARY FLOWS LOOKUP DENIAL OF SERVICE VULNERABILITY", "trust": 0.6 }, { "db": "BID", "id": "59256", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-58696", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-58696" }, { "db": "BID", "id": "59256" }, { "db": "JVNDB", "id": "JVNDB-2013-002243" }, { "db": "NVD", "id": "CVE-2012-5415" }, { "db": "CNNVD", "id": "CNNVD-201304-229" } ] }, "id": "VAR-201304-0035", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-58696" } ], "trust": 0.7311873 }, "last_update_date": "2023-12-18T13:09:35.660000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Secondary Flows Lookup Denial of Service Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2012-5415" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002243" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-58696" }, { "db": "JVNDB", "id": "JVNDB-2013-002243" }, { "db": "NVD", "id": "CVE-2012-5415" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2012-5415" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5415" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5415" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps6120/index.html" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-58696" }, { "db": "BID", "id": "59256" }, { "db": "JVNDB", "id": "JVNDB-2013-002243" }, { "db": "NVD", "id": "CVE-2012-5415" }, { "db": "CNNVD", "id": "CNNVD-201304-229" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-58696" }, { "db": "BID", "id": "59256" }, { "db": "JVNDB", "id": "JVNDB-2013-002243" }, { "db": "NVD", "id": "CVE-2012-5415" }, { "db": "CNNVD", "id": "CNNVD-201304-229" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-16T00:00:00", "db": "VULHUB", "id": "VHN-58696" }, { "date": "2013-04-11T00:00:00", "db": "BID", "id": "59256" }, { "date": "2013-04-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002243" }, { "date": "2013-04-16T14:04:30.890000", "db": "NVD", "id": "CVE-2012-5415" }, { "date": "2013-04-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-229" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-16T00:00:00", "db": "VULHUB", "id": "VHN-58696" }, { "date": "2013-04-11T00:00:00", "db": "BID", "id": "59256" }, { "date": "2013-04-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002243" }, { "date": "2013-04-16T14:04:30.890000", "db": "NVD", "id": "CVE-2012-5415" }, { "date": "2013-04-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-229" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-229" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Adaptive Security Appliances Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002243" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competitive condition", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-229" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.