ID

VAR-201301-0150


CVE

CVE-2012-6395


TITLE

Cisco Adaptive Security Appliances Service disruption in ( Device crash ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-001218

DESCRIPTION

Cisco Adaptive Security Appliances (ASA) devices with firmware 8.4 do not properly validate unspecified input related to UNC share pathnames, which allows remote authenticated users to cause a denial of service (device crash) via unknown vectors, aka Bug ID CSCuc65775. The problem is Bug ID CSCuc65775 It is a problem.Service disruption by remotely authenticated user ( Device crash ) There is a possibility of being put into a state. An authenticated attacker can exploit this issue to cause a crash, denying service to legitimate users. Cisco Adaptive Security Appliances (ASA) 8.4 is vulnerable; other versions may also be affected. This issue is being tracked by Cisco Bug ID CSCuc65775. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Cisco Adaptive Security Appliance CIFS UNC Handling Denial of Service Vulnerability SECUNIA ADVISORY ID: SA51955 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51955/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51955 RELEASE DATE: 2013-01-28 DISCUSS ADVISORY: http://secunia.com/advisories/51955/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51955/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51955 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to an error when handling CIFS UNC input and can be exploited to cause a crash. The vulnerability is reported in version 8.4. SOLUTION: Contact the vendor for patches. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6395 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-6395 // JVNDB: JVNDB-2013-001218 // BID: 57484 // VULHUB: VHN-59676 // PACKETSTORM: 119845

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.4

Trust: 2.4

vendor:ciscomodel:asa 5500scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:asa 1000v cloud firewallscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:asa 1000v cloud firewallscope: - version: -

Trust: 0.8

vendor:ciscomodel:asa 5500 seriesscope: - version: -

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.4

Trust: 0.3

sources: BID: 57484 // JVNDB: JVNDB-2013-001218 // CNNVD: CNNVD-201301-387 // NVD: CVE-2012-6395

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-6395
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-6395
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201301-387
value: MEDIUM

Trust: 0.6

VULHUB: VHN-59676
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-6395
severity: MEDIUM
baseScore: 6.3
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-59676
severity: MEDIUM
baseScore: 6.3
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-59676 // JVNDB: JVNDB-2013-001218 // CNNVD: CNNVD-201301-387 // NVD: CVE-2012-6395

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-59676 // JVNDB: JVNDB-2013-001218 // NVD: CVE-2012-6395

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-387

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201301-387

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001218

PATCH

title:CVE-2012-6395url:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6395

Trust: 0.8

sources: JVNDB: JVNDB-2013-001218

EXTERNAL IDS

db:NVDid:CVE-2012-6395

Trust: 2.9

db:SECUNIAid:51955

Trust: 1.3

db:SECTRACKid:1028009

Trust: 1.1

db:JVNDBid:JVNDB-2013-001218

Trust: 0.8

db:CNNVDid:CNNVD-201301-387

Trust: 0.7

db:CISCOid:20130112 CISCO ADAPTIVE SECURITY APPLIANCE CIFS UNC INPUT VALIDATION ISSUE

Trust: 0.6

db:BIDid:57484

Trust: 0.4

db:VULHUBid:VHN-59676

Trust: 0.1

db:PACKETSTORMid:119845

Trust: 0.1

sources: VULHUB: VHN-59676 // BID: 57484 // JVNDB: JVNDB-2013-001218 // PACKETSTORM: 119845 // CNNVD: CNNVD-201301-387 // NVD: CVE-2012-6395

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2012-6395

Trust: 2.1

url:http://www.securitytracker.com/id/1028009

Trust: 1.1

url:http://secunia.com/advisories/51955

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6395

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6395

Trust: 0.8

url:http://www.cisco.com

Trust: 0.3

url:http://secunia.com/advisories/51955/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51955

Trust: 0.1

url:http://secunia.com/advisories/51955/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-59676 // BID: 57484 // JVNDB: JVNDB-2013-001218 // PACKETSTORM: 119845 // CNNVD: CNNVD-201301-387 // NVD: CVE-2012-6395

CREDITS

Cisco

Trust: 0.3

sources: BID: 57484

SOURCES

db:VULHUBid:VHN-59676
db:BIDid:57484
db:JVNDBid:JVNDB-2013-001218
db:PACKETSTORMid:119845
db:CNNVDid:CNNVD-201301-387
db:NVDid:CVE-2012-6395

LAST UPDATE DATE

2024-11-23T22:59:48.023000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-59676date:2013-02-02T00:00:00
db:BIDid:57484date:2013-01-12T00:00:00
db:JVNDBid:JVNDB-2013-001218date:2013-01-22T00:00:00
db:CNNVDid:CNNVD-201301-387date:2013-01-21T00:00:00
db:NVDid:CVE-2012-6395date:2024-11-21T01:46:05.030

SOURCES RELEASE DATE

db:VULHUBid:VHN-59676date:2013-01-18T00:00:00
db:BIDid:57484date:2013-01-12T00:00:00
db:JVNDBid:JVNDB-2013-001218date:2013-01-22T00:00:00
db:PACKETSTORMid:119845date:2013-01-28T06:24:04
db:CNNVDid:CNNVD-201301-387date:2013-01-21T00:00:00
db:NVDid:CVE-2012-6395date:2013-01-18T21:55:01.073