Lucene search

K
ciscoCiscoCISCO-SA-20121010-FWSM
HistoryOct 10, 2012 - 4:00 p.m.

Multiple Vulnerabilities in Cisco Firewall Services Module

2012-10-1016:00:00
tools.cisco.com
17

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:P/A:C

0.083 Low

EPSS

Percentile

94.4%

The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers is affected by the
following vulnerabilities:

DCERPC Inspection Buffer Overflow Vulnerability

DCERPC Inspection Denial Of Service Vulnerabilities

These vulnerabilities are not interdependent; a release that is
affected by one vulnerability is not necessarily affected by the
other.

Exploitation of these vulnerabilities could allow an unauthenticated,
remote attacker to trigger a reload of the affected device, or to execute arbitrary commands. Repeated
exploitation could result in a denial of service (DoS) condition.

Cisco has released software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm”]

Note: The Cisco Catalyst 6500 Series ASA Services Module, and the Cisco ASA 5500 Series Adaptive Security Appliance may also be affected by these vulnerabilities.

The vulnerabilities affecting the Cisco Catalyst 6500 Series ASA Services Module and Cisco ASA 5500 Series Adaptive Security Appliance have been disclosed in a separate Cisco Security Advisory. The Advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa”]

Affected configurations

Vulners
Node
ciscopix_firewallMatchany
OR
ciscoadaptive_security_virtual_applianceMatch8.3
OR
ciscoadaptive_security_virtual_applianceMatch8.4
OR
ciscoadaptive_security_virtual_applianceMatch8.5
OR
ciscoadaptive_security_virtual_applianceMatch8.6
OR
ciscopix_firewallMatchany
OR
ciscoadaptive_security_virtual_applianceMatch8.3.1.1
OR
ciscoadaptive_security_virtual_applianceMatch8.3.1
OR
ciscoadaptive_security_virtual_applianceMatch8.3.2
OR
ciscoadaptive_security_virtual_applianceMatch8.3.2.23
OR
ciscoadaptive_security_virtual_applianceMatch8.3.2.25
OR
ciscoadaptive_security_virtual_applianceMatch8.3.1.4
OR
ciscoadaptive_security_virtual_applianceMatch8.3.1.6
OR
ciscoadaptive_security_virtual_applianceMatch8.3.2.4
OR
ciscoadaptive_security_virtual_applianceMatch8.3.2.13
OR
ciscoadaptive_security_virtual_applianceMatch8.3.2.31
OR
ciscoadaptive_security_virtual_applianceMatch8.3.2.33
OR
ciscoadaptive_security_virtual_applianceMatch8.4.1
OR
ciscoadaptive_security_virtual_applianceMatch8.4.2
OR
ciscoadaptive_security_virtual_applianceMatch8.4.1.3
OR
ciscoadaptive_security_virtual_applianceMatch8.4.1.11
OR
ciscoadaptive_security_virtual_applianceMatch8.4.2.8
OR
ciscoadaptive_security_virtual_applianceMatch8.4.3
OR
ciscoadaptive_security_virtual_applianceMatch8.4.3.8
OR
ciscoadaptive_security_virtual_applianceMatch8.4.3.9
OR
ciscoadaptive_security_virtual_applianceMatch8.4.4
OR
ciscoadaptive_security_virtual_applianceMatch8.4.4.1
OR
ciscoadaptive_security_virtual_applianceMatch8.4.4.3
OR
ciscoadaptive_security_virtual_applianceMatch8.5.1
OR
ciscoadaptive_security_virtual_applianceMatch8.5.1.1
OR
ciscoadaptive_security_virtual_applianceMatch8.5.1.6
OR
ciscoadaptive_security_virtual_applianceMatch8.5.1.7
OR
ciscoadaptive_security_virtual_applianceMatch8.6.1.1
OR
ciscoadaptive_security_virtual_applianceMatch8.6.1
OR
ciscoadaptive_security_virtual_applianceMatch8.6.1.2

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:P/A:C

0.083 Low

EPSS

Percentile

94.4%

Related for CISCO-SA-20121010-FWSM