fkie_cve-2012-3899
Vulnerability from fkie_nvd
Published
2012-09-16 10:34
Modified
2025-04-11 00:51
Severity ?
Summary
sensorApp on Cisco IPS 4200 series sensors 6.0, 6.2, and 7.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and process crash, and traffic-inspection outage) via network traffic, aka Bug ID CSCtn23051.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B010D14A-7275-454B-B2F8-31EE0D34C24F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B235817-21BA-40AF-AC39-7343007ABF55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "03105E7F-12F8-4497-8A27-BD2F1653FD38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:ips_4240:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "661A7A3E-09E3-44DA-AEB5-8021BCEF30EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ips_4250_sx:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8C8063-E6F7-44AB-8FCB-2FDCBE54CBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ips_4255:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A2BCB3B-CE33-4B96-A125-8E7001845A5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ips_4260:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C3637DA-60C8-4F15-8906-F67ADA344A18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:ips_4270-20:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9F6387E-B7DF-4146-B24F-0D99190FA71B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "sensorApp on Cisco IPS 4200 series sensors 6.0, 6.2, and 7.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and process crash, and traffic-inspection outage) via network traffic, aka Bug ID CSCtn23051."
    },
    {
      "lang": "es",
      "value": "sensorApp en Cisco IPS serie 4200 sensores v6.0, v6.2, y v7.0 no direcciona la memoria de forma adecuada, lo que podr\u00eda permitir a atacantes remotod provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria, ca\u00edda del proceso e inspecci\u00f3n del tr\u00e1fico fuera de rango) a trav\u00e9s del tr\u00e1fico de red, tambi\u00e9n conocido como Bug ID CSCtn23051."
    }
  ],
  "id": "CVE-2012-3899",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-16T10:34:50.910",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/web/software/282549758/51927/IPS-6_2-4-E4-readme.txt"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…