ID

VAR-201101-0328


CVE

CVE-2010-4674


TITLE

Cisco ASA 5500 Service disruption in the series (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-003932

DESCRIPTION

Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(4) and earlier allows remote attackers to cause a denial of service (block exhaustion) via multicast traffic, aka Bug ID CSCtg63992. The problem is Bug ID CSCtg63992 It is a problem.Denial of service by a third party via multicast traffic ( Block depletion ) There is a possibility of being put into a state. The Cisco Adaptive Security Appliance is an adaptive security appliance that provides modules for security and VPN services. An attacker can exploit these issues to cause denial-of-service conditions. These issues are being tracked by Cisco bug IDs CSCtg06316 and CSCtg63992. A remote attacker can cause denial of service (block consumption) with the help of multicast communication. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Cisco ASA 5500 Series Multicast Traffic Denial of Service SECUNIA ADVISORY ID: SA42942 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42942/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42942 RELEASE DATE: 2011-01-17 DISCUSS ADVISORY: http://secunia.com/advisories/42942/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/42942/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=42942 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error when handling multicast traffic and can be exploited to exhaust certain resources (1550 blocks). The vulnerability is reported in version 8.2(4) and prior. SOLUTION: Restrict access to trusted hosts only (e.g. via network access control lists). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2010-4674 // JVNDB: JVNDB-2011-003932 // CNVD: CNVD-2011-0119 // BID: 45766 // VULHUB: VHN-47279 // PACKETSTORM: 97589

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-0119

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2.2

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.8

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(1\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(1\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(3\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(1.22\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(2\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.10\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(0\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.7\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.16\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.49\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(6.7\)

Trust: 1.0

vendor:ciscomodel:5500 series adaptive security appliancescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:lteversion:8.2\(4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.4.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.27\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.1.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.18\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.48\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.2

Trust: 1.0

vendor:ciscomodel:asa 5500scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.15\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.19\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.7

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.6

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(5.2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.8\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.48\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1.1

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.17\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.14\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance 5500 seriesscope: - version: -

Trust: 0.8

vendor:ciscomodel:adaptive security appliance softwarescope:lteversion:8.2(4)

Trust: 0.8

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:5500<8.2(4)

Trust: 0.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.2\(4\)

Trust: 0.6

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.2)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0.4

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.16)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.45)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0(8.11)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0.4.3

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.44)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(4)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(3)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.1)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.17)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.10)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2.13)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2.10)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.19)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.5)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.15)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.35)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.29)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.7)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0(8.10)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2.17)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.37)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2(5)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2(4.45)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.2)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.39)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.46)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2(4.46)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.15)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(4.38)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.40)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.6)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(4.44)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2(4.44)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(2.1)

Trust: 0.3

sources: CNVD: CNVD-2011-0119 // BID: 45766 // JVNDB: JVNDB-2011-003932 // CNNVD: CNNVD-201101-034 // NVD: CVE-2010-4674

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-4674
value: HIGH

Trust: 1.0

NVD: CVE-2010-4674
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201101-034
value: HIGH

Trust: 0.6

VULHUB: VHN-47279
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-4674
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-47279
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-47279 // JVNDB: JVNDB-2011-003932 // CNNVD: CNNVD-201101-034 // NVD: CVE-2010-4674

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-47279 // JVNDB: JVNDB-2011-003932 // NVD: CVE-2010-4674

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201101-034

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201101-034

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003932

PATCH

title:asarn82url:http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf

Trust: 0.8

title:Patch for Unknown Security Vulnerability (CVE-2010-4674) for Cisco Adaptive Security Appliances (ASA) 5500 Series Appliancesurl:https://www.cnvd.org.cn/patchInfo/show/2545

Trust: 0.6

sources: CNVD: CNVD-2011-0119 // JVNDB: JVNDB-2011-003932

EXTERNAL IDS

db:NVDid:CVE-2010-4674

Trust: 3.4

db:BIDid:45766

Trust: 1.4

db:SECUNIAid:42942

Trust: 1.2

db:SECTRACKid:1024963

Trust: 1.1

db:JVNDBid:JVNDB-2011-003932

Trust: 0.8

db:CNNVDid:CNNVD-201101-034

Trust: 0.7

db:CNVDid:CNVD-2011-0119

Trust: 0.6

db:VULHUBid:VHN-47279

Trust: 0.1

db:PACKETSTORMid:97589

Trust: 0.1

sources: CNVD: CNVD-2011-0119 // VULHUB: VHN-47279 // BID: 45766 // JVNDB: JVNDB-2011-003932 // PACKETSTORM: 97589 // CNNVD: CNNVD-201101-034 // NVD: CVE-2010-4674

REFERENCES

url:http://www.cisco.com/en/us/docs/security/asa/asa82/release/notes/asarn82.pdf

Trust: 2.6

url:http://www.securityfocus.com/bid/45766

Trust: 1.1

url:http://www.securitytracker.com/id?1024963

Trust: 1.1

url:http://secunia.com/advisories/42942

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/64600

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4674

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4674

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://secunia.com/advisories/42942/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/advisories/42942/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42942

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.cisco.com/en/us/docs/security/asa/asa82/release/notes/asarn82.html

Trust: 0.1

sources: CNVD: CNVD-2011-0119 // VULHUB: VHN-47279 // BID: 45766 // JVNDB: JVNDB-2011-003932 // PACKETSTORM: 97589 // CNNVD: CNNVD-201101-034 // NVD: CVE-2010-4674

CREDITS

Cisco

Trust: 0.3

sources: BID: 45766

SOURCES

db:CNVDid:CNVD-2011-0119
db:VULHUBid:VHN-47279
db:BIDid:45766
db:JVNDBid:JVNDB-2011-003932
db:PACKETSTORMid:97589
db:CNNVDid:CNNVD-201101-034
db:NVDid:CVE-2010-4674

LAST UPDATE DATE

2024-11-23T21:47:04.241000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-0119date:2011-01-12T00:00:00
db:VULHUBid:VHN-47279date:2017-08-17T00:00:00
db:BIDid:45766date:2011-01-11T00:00:00
db:JVNDBid:JVNDB-2011-003932date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201101-034date:2011-01-10T00:00:00
db:NVDid:CVE-2010-4674date:2024-11-21T01:21:29.473

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-0119date:2011-01-12T00:00:00
db:VULHUBid:VHN-47279date:2011-01-07T00:00:00
db:BIDid:45766date:2011-01-11T00:00:00
db:JVNDBid:JVNDB-2011-003932date:2012-03-27T00:00:00
db:PACKETSTORMid:97589date:2011-01-18T10:41:59
db:CNNVDid:CNNVD-201101-034date:2011-01-10T00:00:00
db:NVDid:CVE-2010-4674date:2011-01-07T12:00:50