ID

VAR-201307-0136


CVE

CVE-2013-1218


TITLE

Cisco ASA 5500-X IPS-SSP of Cisco Intrusion Prevention System Service disruption in software (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-003442

DESCRIPTION

Cisco Intrusion Prevention System (IPS) Software in ASA 5500-X IPS-SSP software modules before 7.1(7)sp1E4 allows remote attackers to cause a denial of service (Analysis Engine process hang or device reload) via fragmented (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCue51272. Cisco IPS Software is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCue51272. Cisco Intrusion Prevention System (IPS) is an intrusion prevention system of Cisco (Cisco). The system can immediately interrupt, adjust or isolate some abnormal or harmful network data transmission behaviors. A buffer overflow vulnerability exists in the IPS software in versions prior to 7.1(7)sp1E4 of the ASA 5500-X IPS-SSP software module

Trust: 1.98

sources: NVD: CVE-2013-1218 // JVNDB: JVNDB-2013-003442 // BID: 61300 // VULHUB: VHN-61220

AFFECTED PRODUCTS

vendor:ciscomodel:ips 4360 sensorscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:ips 4345 sensorscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:ips 4510 sensorscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:ips 4520 sensorscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:ips nmescope:eqversion: -

Trust: 1.6

vendor:ciscomodel:idsm-2scope:eqversion: -

Trust: 1.6

vendor:ciscomodel:asa 5585-xscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:asa 5500-x series ips ssp softwarescope:eqversion:7.1

Trust: 1.6

vendor:ciscomodel:intrusion prevention systemscope:lteversion:7.1

Trust: 1.0

vendor:ciscomodel:asa 5500-x series ips security services processor softwarescope:eqversion:(ips ssp)

Trust: 0.8

vendor:ciscomodel:asa 5585-xscope:ltversion:(cisco ips 7.1(7)e4 )

Trust: 0.8

vendor:ciscomodel:intrusion prevention system softwarescope:ltversion:7.1(7p1)e4

Trust: 0.8

vendor:ciscomodel:intrusion prevention systemscope:eqversion:7.1

Trust: 0.6

sources: JVNDB: JVNDB-2013-003442 // CNNVD: CNNVD-201307-395 // NVD: CVE-2013-1218

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1218
value: HIGH

Trust: 1.0

NVD: CVE-2013-1218
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201307-395
value: HIGH

Trust: 0.6

VULHUB: VHN-61220
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1218
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61220
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61220 // JVNDB: JVNDB-2013-003442 // CNNVD: CNNVD-201307-395 // NVD: CVE-2013-1218

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-61220 // JVNDB: JVNDB-2013-003442 // NVD: CVE-2013-1218

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201307-395

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201307-395

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003442

PATCH

title:29271url:http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=29271

Trust: 0.8

title:cisco-sa-20130717-ipsurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-ips

Trust: 0.8

title:30024url:http://tools.cisco.com/security/center/viewAlert.x?alertId=30024

Trust: 0.8

title:cisco-sa-20130717-ipsurl:http://www.cisco.com/cisco/web/support/JP/111/1118/1118530_cisco-sa-20130717-ips-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2013-003442

EXTERNAL IDS

db:NVDid:CVE-2013-1218

Trust: 2.8

db:JVNDBid:JVNDB-2013-003442

Trust: 0.8

db:CNNVDid:CNNVD-201307-395

Trust: 0.7

db:CISCOid:20130717 MULTIPLE VULNERABILITIES IN CISCO INTRUSION PREVENTION SYSTEM SOFTWARE

Trust: 0.6

db:BIDid:61300

Trust: 0.4

db:VULHUBid:VHN-61220

Trust: 0.1

sources: VULHUB: VHN-61220 // BID: 61300 // JVNDB: JVNDB-2013-003442 // CNNVD: CNNVD-201307-395 // NVD: CVE-2013-1218

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130717-ips

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1218

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1218

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=30024

Trust: 0.3

sources: VULHUB: VHN-61220 // BID: 61300 // JVNDB: JVNDB-2013-003442 // CNNVD: CNNVD-201307-395 // NVD: CVE-2013-1218

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 61300

SOURCES

db:VULHUBid:VHN-61220
db:BIDid:61300
db:JVNDBid:JVNDB-2013-003442
db:CNNVDid:CNNVD-201307-395
db:NVDid:CVE-2013-1218

LAST UPDATE DATE

2024-08-14T14:34:19.115000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61220date:2013-07-18T00:00:00
db:BIDid:61300date:2013-07-17T00:00:00
db:JVNDBid:JVNDB-2013-003442date:2013-07-22T00:00:00
db:CNNVDid:CNNVD-201307-395date:2013-07-29T00:00:00
db:NVDid:CVE-2013-1218date:2013-07-18T12:48:56.047

SOURCES RELEASE DATE

db:VULHUBid:VHN-61220date:2013-07-18T00:00:00
db:BIDid:61300date:2013-07-17T00:00:00
db:JVNDBid:JVNDB-2013-003442date:2013-07-22T00:00:00
db:CNNVDid:CNNVD-201307-395date:2013-07-22T00:00:00
db:NVDid:CVE-2013-1218date:2013-07-18T12:48:56.047