var-201307-0136
Vulnerability from variot
Cisco Intrusion Prevention System (IPS) Software in ASA 5500-X IPS-SSP software modules before 7.1(7)sp1E4 allows remote attackers to cause a denial of service (Analysis Engine process hang or device reload) via fragmented (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCue51272. Cisco IPS Software is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCue51272. Cisco Intrusion Prevention System (IPS) is an intrusion prevention system of Cisco (Cisco). The system can immediately interrupt, adjust or isolate some abnormal or harmful network data transmission behaviors. A buffer overflow vulnerability exists in the IPS software in versions prior to 7.1(7)sp1E4 of the ASA 5500-X IPS-SSP software module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201307-0136", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "idsm-2", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "ips 4520 sensor", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "ips nme", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "asa 5585-x", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "asa 5500-x series ips ssp software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.1" }, { "model": "ips 4510 sensor", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "ips 4345 sensor", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "ips 4360 sensor", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "intrusion prevention system", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "7.1" }, { "model": "asa 5500-x series ips security services processor software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "(ips ssp)" }, { "model": "asa 5585-x", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "(cisco ips 7.1(7)e4 )" }, { "model": "intrusion prevention system software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.1(7p1)e4" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003442" }, { "db": "NVD", "id": "CVE-2013-1218" }, { "db": "CNNVD", "id": "CNNVD-201307-395" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:ips_4510_sensor:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:ips_4345_sensor:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:ips_nme:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:idsm-2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:intrusion_prevention_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asa_5500-x_series_ips_ssp_software:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:ips_4520_sensor:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:ips_4360_sensor:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-1218" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "61300" } ], "trust": 0.3 }, "cve": "CVE-2013-1218", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2013-1218", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-61220", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-1218", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201307-395", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-61220", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-61220" }, { "db": "JVNDB", "id": "JVNDB-2013-003442" }, { "db": "NVD", "id": "CVE-2013-1218" }, { "db": "CNNVD", "id": "CNNVD-201307-395" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Intrusion Prevention System (IPS) Software in ASA 5500-X IPS-SSP software modules before 7.1(7)sp1E4 allows remote attackers to cause a denial of service (Analysis Engine process hang or device reload) via fragmented (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCue51272. Cisco IPS Software is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCue51272. Cisco Intrusion Prevention System (IPS) is an intrusion prevention system of Cisco (Cisco). The system can immediately interrupt, adjust or isolate some abnormal or harmful network data transmission behaviors. A buffer overflow vulnerability exists in the IPS software in versions prior to 7.1(7)sp1E4 of the ASA 5500-X IPS-SSP software module", "sources": [ { "db": "NVD", "id": "CVE-2013-1218" }, { "db": "JVNDB", "id": "JVNDB-2013-003442" }, { "db": "BID", "id": "61300" }, { "db": "VULHUB", "id": "VHN-61220" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-1218", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2013-003442", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201307-395", "trust": 0.7 }, { "db": "CISCO", "id": "20130717 MULTIPLE VULNERABILITIES IN CISCO INTRUSION PREVENTION SYSTEM SOFTWARE", "trust": 0.6 }, { "db": "BID", "id": "61300", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-61220", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-61220" }, { "db": "BID", "id": "61300" }, { "db": "JVNDB", "id": "JVNDB-2013-003442" }, { "db": "NVD", "id": "CVE-2013-1218" }, { "db": "CNNVD", "id": "CNNVD-201307-395" } ] }, "id": "VAR-201307-0136", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-61220" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:38:33.326000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "29271", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewambalert.x?alertid=29271" }, { "title": "cisco-sa-20130717-ips", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130717-ips" }, { "title": "30024", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=30024" }, { "title": "cisco-sa-20130717-ips", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1118/1118530_cisco-sa-20130717-ips-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003442" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-61220" }, { "db": "JVNDB", "id": "JVNDB-2013-003442" }, { "db": "NVD", "id": "CVE-2013-1218" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130717-ips" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1218" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1218" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=30024" } ], "sources": [ { "db": "VULHUB", "id": "VHN-61220" }, { "db": "BID", "id": "61300" }, { "db": "JVNDB", "id": "JVNDB-2013-003442" }, { "db": "NVD", "id": "CVE-2013-1218" }, { "db": "CNNVD", "id": "CNNVD-201307-395" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-61220" }, { "db": "BID", "id": "61300" }, { "db": "JVNDB", "id": "JVNDB-2013-003442" }, { "db": "NVD", "id": "CVE-2013-1218" }, { "db": "CNNVD", "id": "CNNVD-201307-395" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-07-18T00:00:00", "db": "VULHUB", "id": "VHN-61220" }, { "date": "2013-07-17T00:00:00", "db": "BID", "id": "61300" }, { "date": "2013-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003442" }, { "date": "2013-07-18T12:48:56.047000", "db": "NVD", "id": "CVE-2013-1218" }, { "date": "2013-07-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-395" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-07-18T00:00:00", "db": "VULHUB", "id": "VHN-61220" }, { "date": "2013-07-17T00:00:00", "db": "BID", "id": "61300" }, { "date": "2013-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003442" }, { "date": "2013-07-18T12:48:56.047000", "db": "NVD", "id": "CVE-2013-1218" }, { "date": "2013-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-395" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-395" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ASA 5500-X IPS-SSP of Cisco Intrusion Prevention System Service disruption in software (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003442" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-395" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.