Vulnerability Details : CVE-2012-4660
The SIP inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.2 before 8.2(5.17), 8.3 before 8.3(2.28), 8.4 before 8.4(2.13), 8.5 before 8.5(1.4), and 8.6 before 8.6(1.5) allows remote attackers to cause a denial of service (device reload) via a crafted SIP media-update packet, aka Bug ID CSCtr63728.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2012-4660
- cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(3\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(3.9\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(4\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(4.1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(4.4\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(5\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(1.11\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(2.11\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\(1\):*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-4660
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-4660
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2012-4660
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4660
-
http://osvdb.org/86144
-
http://www.securityfocus.com/bid/55864
Cisco ASA 5500 Series and Cisco Catalyst 6500 Series CVE-2012-4660 Denial of Service Vulnerability
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa
Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services ModuleVendor Advisory
Jump to