Vulnerabilities > CVE-2011-0393 - Resource Management Errors vulnerability in Cisco products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.12), 7.1 and 7.2 before 7.2(5.2), 8.0 before 8.0(5.21), 8.1 before 8.1(2.49), 8.2 before 8.2(3.6), and 8.3 before 8.3(2.7) and Cisco PIX Security Appliances 500 series devices, when transparent firewall mode is configured but IPv6 is not configured, allow remote attackers to cause a denial of service (packet buffer exhaustion and device outage) via IPv6 traffic, aka Bug ID CSCtj04707.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | CISCO |
NASL id | CISCO-SA-20110223-ASA.NASL |
description | The remote Cisco ASA device is missing a security patch and may be affected by the following issues : - When configured for transparent firewall mode, a packet buffer exhaustion vulnerability could cause the appliance to stop forwarding traffic. (CVE-2011-0393) - When SCCP inspection is enabled, a malformed SCCP message could cause the appliance to reload. (CVE-2011-0394) - If both RIP and the Cisco Phone Proxy feature are enabled, the appliance may reload when processing valid RIP updates. (CVE-2011-0395) - When the appliance is configured as a local CA server, unauthorized users can obtain sensitive data without providing authentication. (CVE-2011-0396) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 52586 |
published | 2011-03-09 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/52586 |
title | Cisco ASA 5500 Series Multiple Vulnerabilities (cisco-sa-20110223-asa) |
code |
|
References
- http://secunia.com/advisories/43488
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml
- http://www.securitytracker.com/id?1025108
- http://www.vupen.com/english/advisories/2011/0493
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65589
- http://secunia.com/advisories/43488
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65589
- http://www.vupen.com/english/advisories/2011/0493
- http://www.securitytracker.com/id?1025108
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml