ID

VAR-201209-0200


CVE

CVE-2012-4622


TITLE

Cisco Catalyst 4500E Series Switch Denial of Service Vulnerability

Trust: 0.8

sources: IVD: 57d89702-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5477

DESCRIPTION

Cisco IOS XE 03.02.00.XO.15.0(2)XO on Catalyst 4500E series switches, when a Supervisor Engine 7L-E card is installed, allows remote attackers to cause a denial of service (card reload) via malformed packets that trigger uncorrected ECC error messages, aka Bug ID CSCty88456. The Cisco Catalyst 4500 E-Series is the next-generation, high-performance extension of the Cisco Catalyst 4500 Series Ethernet Modular Switch. This Cisco bug ID is CSCty88456. Successfully exploiting this issue will result in denial-of-service conditions. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment

Trust: 2.7

sources: NVD: CVE-2012-4622 // JVNDB: JVNDB-2012-004644 // CNVD: CNVD-2012-5477 // BID: 55701 // IVD: 57d89702-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-57903

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 57d89702-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5477

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.2.00.xo.15.0\(2\)xo

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:03.02.00.xo.15.0(2)xo

Trust: 0.8

vendor:ciscomodel:ios xe 03.02.00.xo.15.0 xoscope: - version: -

Trust: 0.6

vendor:ios xemodel:3.2.00.xo.15.0 xoscope: - version: -

Trust: 0.2

sources: IVD: 57d89702-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5477 // JVNDB: JVNDB-2012-004644 // CNNVD: CNNVD-201209-615 // NVD: CVE-2012-4622

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4622
value: HIGH

Trust: 1.0

NVD: CVE-2012-4622
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201209-615
value: HIGH

Trust: 0.6

IVD: 57d89702-2353-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

VULHUB: VHN-57903
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-4622
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 57d89702-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-57903
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 57d89702-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-57903 // JVNDB: JVNDB-2012-004644 // CNNVD: CNNVD-201209-615 // NVD: CVE-2012-4622

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-57903 // JVNDB: JVNDB-2012-004644 // NVD: CVE-2012-4622

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-615

TYPE

Resource management error

Trust: 0.8

sources: IVD: 57d89702-2353-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201209-615

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004644

PATCH

title:cisco-sa-20120926-eccurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ecc

Trust: 0.8

title:cisco-sa-20120926-eccurl:http://www.cisco.com/cisco/web/support/JP/111/1116/1116606_cisco-sa-20120926-ecc-j.html

Trust: 0.8

title:Patch for Cisco Catalyst 4500E Series Switch Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/23311

Trust: 0.6

sources: CNVD: CNVD-2012-5477 // JVNDB: JVNDB-2012-004644

EXTERNAL IDS

db:NVDid:CVE-2012-4622

Trust: 3.6

db:BIDid:55701

Trust: 1.4

db:OSVDBid:85821

Trust: 1.1

db:SECTRACKid:1027573

Trust: 1.1

db:CNNVDid:CNNVD-201209-615

Trust: 0.9

db:CNVDid:CNVD-2012-5477

Trust: 0.8

db:JVNDBid:JVNDB-2012-004644

Trust: 0.8

db:NSFOCUSid:20881

Trust: 0.6

db:CISCOid:20120926 CISCO CATALYST 4500E SERIES SWITCH WITH CISCO CATALYST SUPERVISOR ENGINE 7L-E DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:IVDid:57D89702-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-57903

Trust: 0.1

sources: IVD: 57d89702-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-5477 // VULHUB: VHN-57903 // BID: 55701 // JVNDB: JVNDB-2012-004644 // CNNVD: CNNVD-201209-615 // NVD: CVE-2012-4622

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120926-ecc

Trust: 2.3

url:http://www.securityfocus.com/bid/55701

Trust: 1.1

url:http://osvdb.org/85821

Trust: 1.1

url:http://www.securitytracker.com/id?1027573

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/78886

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4622

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4622

Trust: 0.8

url:http://www.nsfocus.net/vulndb/20881

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2012-5477 // VULHUB: VHN-57903 // BID: 55701 // JVNDB: JVNDB-2012-004644 // CNNVD: CNNVD-201209-615 // NVD: CVE-2012-4622

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 55701

SOURCES

db:IVDid:57d89702-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-5477
db:VULHUBid:VHN-57903
db:BIDid:55701
db:JVNDBid:JVNDB-2012-004644
db:CNNVDid:CNNVD-201209-615
db:NVDid:CVE-2012-4622

LAST UPDATE DATE

2024-11-23T22:08:42.436000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-5477date:2012-09-28T00:00:00
db:VULHUBid:VHN-57903date:2017-08-29T00:00:00
db:BIDid:55701date:2012-09-26T00:00:00
db:JVNDBid:JVNDB-2012-004644date:2012-09-28T00:00:00
db:CNNVDid:CNNVD-201209-615date:2012-09-27T00:00:00
db:NVDid:CVE-2012-4622date:2024-11-21T01:43:16.803

SOURCES RELEASE DATE

db:IVDid:57d89702-2353-11e6-abef-000c29c66e3ddate:2012-09-28T00:00:00
db:CNVDid:CNVD-2012-5477date:2012-09-28T00:00:00
db:VULHUBid:VHN-57903date:2012-09-27T00:00:00
db:BIDid:55701date:2012-09-26T00:00:00
db:JVNDBid:JVNDB-2012-004644date:2012-09-28T00:00:00
db:CNNVDid:CNNVD-201209-615date:2012-09-27T00:00:00
db:NVDid:CVE-2012-4622date:2012-09-27T00:55:01.140