Lucene search

K
cve[email protected]CVE-2012-4643
HistoryOct 29, 2012 - 8:55 p.m.

CVE-2012-4643

2012-10-2920:55:01
CWE-399
web.nvd.nist.gov
24
cisco
asa
dhcp
cve-2012-4643
denial of service
security vulnerability
nvd
bug id csctw84068

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

6.8 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.8%

The DHCP server on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 before 7.2(5.8), 7.1 before 7.2(5.8), 7.2 before 7.2(5.8), 8.0 before 8.0(5.28), 8.1 before 8.1(2.56), 8.2 before 8.2(5.27), 8.3 before 8.3(2.31), 8.4 before 8.4(3.10), 8.5 before 8.5(1.9), and 8.6 before 8.6(1.5) does not properly allocate memory for DHCP packets, which allows remote attackers to cause a denial of service (device reload) via a series of crafted IPv4 packets, aka Bug ID CSCtw84068.

Affected configurations

NVD
Node
ciscoadaptive_security_appliance_softwareMatch7.0
OR
ciscoadaptive_security_appliance_softwareMatch7.0\(0\)
OR
ciscoadaptive_security_appliance_softwareMatch7.0\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch7.0\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch7.0\(4\)
OR
ciscoadaptive_security_appliance_softwareMatch7.0\(5\)
OR
ciscoadaptive_security_appliance_softwareMatch7.0\(5.2\)
OR
ciscoadaptive_security_appliance_softwareMatch7.1
OR
ciscoadaptive_security_appliance_softwareMatch7.1\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch7.1\(2.5\)
OR
ciscoadaptive_security_appliance_softwareMatch7.1\(2.27\)
OR
ciscoadaptive_security_appliance_softwareMatch7.1\(2.48\)
OR
ciscoadaptive_security_appliance_softwareMatch7.1\(2.49\)
OR
ciscoadaptive_security_appliance_softwareMatch7.1\(5\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(1.22\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.5\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.7\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.8\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.10\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.14\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.15\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.16\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.17\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.18\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.19\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(2.48\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(3\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(4\)
OR
ciscoadaptive_security_appliance_softwareMatch7.2\(5\)
OR
ciscoadaptive_security_appliance_softwareMatch8.0
OR
ciscoadaptive_security_appliance_softwareMatch8.0\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch8.0\(3\)
OR
ciscoadaptive_security_appliance_softwareMatch8.0\(4\)
OR
ciscoadaptive_security_appliance_softwareMatch8.0\(5\)
OR
ciscoadaptive_security_appliance_softwareMatch8.1
OR
ciscoadaptive_security_appliance_softwareMatch8.2
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(3\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(3.9\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(4\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(4.1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(4.4\)
OR
ciscoadaptive_security_appliance_softwareMatch8.2\(5\)
OR
ciscoadaptive_security_appliance_softwareMatch8.3\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.3\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(1.11\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(2\)
OR
ciscoadaptive_security_appliance_softwareMatch8.4\(2.11\)
OR
ciscoadaptive_security_appliance_softwareMatch8.5
OR
ciscoadaptive_security_appliance_softwareMatch8.5\(1\)
OR
ciscoadaptive_security_appliance_softwareMatch8.5\(1.4\)
OR
ciscoadaptive_security_appliance_softwareMatch8.6
OR
ciscoadaptive_security_appliance_softwareMatch8.6\(1\)
AND
cisco5500_series_adaptive_security_appliance
OR
ciscocatalyst_6500
OR
ciscocatalyst_6503-eMatch-
OR
ciscocatalyst_6504-eMatch-
OR
ciscocatalyst_6506-eMatch-
OR
ciscocatalyst_6509-eMatch-
OR
ciscocatalyst_6509-neb-aMatch-
OR
ciscocatalyst_6509-v-eMatch-
OR
ciscocatalyst_6513Match-
OR
ciscocatalyst_6513-eMatch-

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

6.8 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.8%

Related for CVE-2012-4643