CVE-2012-3058
Published Jun 20, 2012
Last updated a year ago
Overview
- Description
- Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.4 before 8.4(4.1), 8.5 before 8.5(1.11), and 8.6 before 8.6(1.3) allow remote attackers to cause a denial of service (device reload) via IPv6 transit traffic that triggers syslog message 110003, aka Bug ID CSCua27134.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A914DE5-2269-451A-823A-B26AE1A7F980" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69683734-528F-488A-8A90-8478FA27B97E" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95EC2D6C-84BA-4A58-B4A0-6FF8613AF9C0" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "691166C2-1FBD-46EB-8AA5-FCE303444ACD" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4956430E-BEC1-4788-B0D2-E50E36C70306" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "310B4795-4BC3-4F47-8F54-C513ECC2C9F9" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9E87F3D-669C-4451-A4C4-E8FE04769248" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4154E951-DE5D-4D48-B5BA-B3CCDDA3FBA2" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BFCE154-6582-49E2-9B9D-641986B7D653" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CB79D96-75EA-4B4F-99A7-9AB4158B7301" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99DE48DF-A309-4A1C-B977-AE81B4EDB589" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F202892E-2E58-4D77-B983-38AFA51CDBC6" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F57DF3E-4069-4EF0-917E-84CDDFCEBEEF" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BE25114-ABBC-47A0-9C20-E8D40D721313" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FADD5F49-2817-40EC-861C-C922825708BD" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E628F9C4-98C6-4A95-AF81-F1E6A56E8648" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AFF899C-1EB3-46D8-9003-EA36A68C90B3" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6463491-F63E-44CB-A1D4-C029BE7D3D3D" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8668D34-096B-4FC3-B9B1-0ECFD6265778" } ], "operator": "OR" } ], "operator": "AND" } ]