Vulnerabilities > CVE-2011-0395 - Resource Management Errors vulnerability in Cisco products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | CISCO |
NASL id | CISCO-SA-20110223-ASA.NASL |
description | The remote Cisco ASA device is missing a security patch and may be affected by the following issues : - When configured for transparent firewall mode, a packet buffer exhaustion vulnerability could cause the appliance to stop forwarding traffic. (CVE-2011-0393) - When SCCP inspection is enabled, a malformed SCCP message could cause the appliance to reload. (CVE-2011-0394) - If both RIP and the Cisco Phone Proxy feature are enabled, the appliance may reload when processing valid RIP updates. (CVE-2011-0395) - When the appliance is configured as a local CA server, unauthorized users can obtain sensitive data without providing authentication. (CVE-2011-0396) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 52586 |
published | 2011-03-09 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/52586 |
title | Cisco ASA 5500 Series Multiple Vulnerabilities (cisco-sa-20110223-asa) |
code |
|
References
- http://secunia.com/advisories/43488
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml
- http://www.securitytracker.com/id?1025108
- http://www.vupen.com/english/advisories/2011/0493
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65590
- http://secunia.com/advisories/43488
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65590
- http://www.vupen.com/english/advisories/2011/0493
- http://www.securitytracker.com/id?1025108
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml