Vulnerability Details : CVE-2012-4661
Stack-based buffer overflow in the DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.34), 8.4 before 8.4(4.4), 8.5 before 8.5(1.13), and 8.6 before 8.6(1.3) and the Firewall Services Module (FWSM) 4.1 before 4.1(9) in Cisco Catalyst 6500 series switches and 7600 series routers might allow remote attackers to execute arbitrary code via a crafted DCERPC packet, aka Bug IDs CSCtr21359 and CSCtr27522.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2012-4661
Probability of exploitation activity in the next 30 days: 8.34%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-4661
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:M/Au:N/C:C/I:P/A:C |
8.6
|
9.5
|
NIST |
CWE ids for CVE-2012-4661
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4661
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79173
Cisco Firewall Services Module DCERPC buffer overflow CVE-2012-4661 Vulnerability Report
-
http://www.securityfocus.com/bid/55863
Multiple Cisco Products CVE-2012-4661 Buffer Overflow Vulnerability
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm
Multiple Vulnerabilities in Cisco Firewall Services Module
-
http://secunia.com/advisories/50857
Sign in
-
http://osvdb.org/86146
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa
Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module
Products affected by CVE-2012-4661
- cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:7600_router:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(1.11\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(2.11\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\(1.4\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\(1\):*:*:*:*:*:*:*