4 results (0.026 seconds)

CVSS: 9.0EPSS: 8%CPEs: 23EXPL: 0

Stack-based buffer overflow in the DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.34), 8.4 before 8.4(4.4), 8.5 before 8.5(1.13), and 8.6 before 8.6(1.3) and the Firewall Services Module (FWSM) 4.1 before 4.1(9) in Cisco Catalyst 6500 series switches and 7600 series routers might allow remote attackers to execute arbitrary code via a crafted DCERPC packet, aka Bug IDs CSCtr21359 and CSCtr27522. El motor de inspección DCERPC en los dispositivos Cisco Adaptive Security Appliances (ASA) 5500, y el Módulo de Servicios de ASA (ASASM) en los dispositivos Cisco Catalyst 6500, con la versión del software anterior a la v8.3(2.25), v8.4 antes de v8.4 (2,5) y v8.5 antes de v8.5(1.13) y v8.6 antes de v8.6(1.3) y el módulo Firewall Services Module (FWSM) v4.1 antes de v4.1(7) en los switches Cisco Catalyst 6500 y los routers de la serie 7600, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de un paquete DCERPC modificado, también conocido como bug CSCtr21359 y CSCtr27522. • http://osvdb.org/86146 http://secunia.com/advisories/50857 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm http://www.securityfocus.com/bid/55863 https://exchange.xforce.ibmcloud.com/vulnerabilities/79173 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 1%CPEs: 21EXPL: 0

The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21346 and CSCtr27521. El motor de inspección DCERPC en los dispositivos Cisco Adaptive Security Appliances (ASA) 5500, y el Módulo de Servicios de ASA (ASASM) en los dispositivos Cisco Catalyst 6500, con la versión del software anterior a la v8.3(2.25), v8.4 antes de v8.4 (2,5) y v8.5 antes de v8.5(1.13) y el Firewall Services Module (FWSM) v4.1 antes de v4.1(7) en los switches Cisco Catalyst 6500 y los routers de la serie 7600, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de un paquete DCERPC modificado, también conocido como bug CSCtr21346 y CSCtr27521. • http://osvdb.org/86148 http://secunia.com/advisories/50857 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm http://www.securityfocus.com/bid/55862 https://exchange.xforce.ibmcloud.com/vulnerabilities/79175 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 1%CPEs: 21EXPL: 0

The DCERPC inspection engine on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.13) and the Firewall Services Module (FWSM) 4.1 before 4.1(7) in Cisco Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via a crafted DCERPC packet, aka Bug IDs CSCtr21376 and CSCtr27524. El motor de inspección DCERPC en los dispositivos Cisco Adaptive Security Appliances (ASA) 5500, y el Módulo de Servicios de ASA (ASASM) en los dispositivos Cisco Catalyst 6500, con la versión del software anterior a la v8.3(2.25), v8.4 antes de v8.4 (2,5) y v8.5 antes de v8.5(1.13) y el Firewall Services Module (FWSM) v4.1 antes de v4.1(7) en los switches Cisco Catalyst 6500 y los routers de la serie 7600, permite a atacantes remotos provocar una denegación de servicio (reinicio del dispositivo) a través de un paquete DCERPC modificado, también conocido como bug CSCtr21376 y CSCtr27524. • http://osvdb.org/86147 http://secunia.com/advisories/50857 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm http://www.securityfocus.com/bid/55862 https://exchange.xforce.ibmcloud.com/vulnerabilities/79174 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Cisco routers 9.17 and earlier allow remote attackers to bypass security restrictions via certain IP source routed packets that should normally be denied using the "no ip source-route" command. • http://ciac.llnl.gov/ciac/bulletins/d-15.shtml http://www.cert.org/advisories/CA-1993-07.html https://exchange.xforce.ibmcloud.com/vulnerabilities/541 •