Vulnerability Details : CVE-2012-4663
The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21346 and CSCtr27521.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2012-4663
Probability of exploitation activity in the next 30 days: 1.82%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-4663
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:M/Au:N/C:N/I:N/A:C |
8.6
|
6.9
|
NIST |
CWE ids for CVE-2012-4663
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4663
-
http://www.securityfocus.com/bid/55862
Multiple Cisco Products Multiple Remote Denial of Service Vulnerabilities
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm
Multiple Vulnerabilities in Cisco Firewall Services Module
-
http://secunia.com/advisories/50857
Sign in
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79175
Cisco Firewall Services Module DCERPC denial of service CVE-2012-4663 Vulnerability Report
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa
Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services ModuleVendor Advisory
-
http://osvdb.org/86148
Products affected by CVE-2012-4663
- cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:7600_router:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(1.11\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(2\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\(1\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(2.11\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\(1.4\):*:*:*:*:*:*:*