CVE-2011-4006
https://notcve.org/view.php?id=CVE-2011-4006
The ESMTP inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.5 allows remote attackers to cause a denial of service (CPU consumption) via an unspecified closing sequence, aka Bug ID CSCtt32565. La característica de inspección ESMTP en Cisco Adaptive Security Appliances (ASA) 5500 con el software v8.2 a v8.5 permite a atacantes remotos causar una denegación de servicio (consumo de CPU) a través de una secuencia de cierre no se especifica, también conocido como Bug ID CSCtt32565. • http://www.cisco.com/web/software/283878312/88166/ASA-851-Interim-Release-Notes.html http://www.securitytracker.com/id?1027008 • CWE-20: Improper Input Validation •
CVE-2011-3285
https://notcve.org/view.php?id=CVE-2011-3285
CRLF injection vulnerability in /+CSCOE+/logon.html on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 through 8.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors, aka Bug ID CSCth63101. Vulnerabilidad de ejecución CRLF en /+CSCOE+/logon.html en Cisco Adaptive Security Appliances (ASA) 5500 con software v8.0 a v8.4 permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y llevar a cabo ataques de división de respuesta HTTP a través de vectores no especificados, también conocido como Bug ID CSCth63101. • http://www.cisco.com/web/software/280775065/37740/ASA-805-Interim-Release-Notes.html http://www.securitytracker.com/id?1027008 https://exchange.xforce.ibmcloud.com/vulnerabilities/75343 • CWE-20: Improper Input Validation CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2011-3309
https://notcve.org/view.php?id=CVE-2011-3309
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.4 process IKE requests despite a vpnclient mode configuration, which allows remote attackers to obtain potentially sensitive information by reading IKE responder traffic, aka Bug ID CSCtt07749. Cisco Adaptive Security Appliances (ASA) 5500 con el software v8.2 a v8.4 procesa las solicitudes IKE a pesar de la configuración de modo vpnclient, lo que permite a atacantes remotos obtener información sensible mediante la lectura de tráfico de respuesta IKE, también conocido como Bug ID CSCtt07749. • http://www.cisco.com/web/software/280775065/45357/ASA-825-Interim-Release-Notes.html http://www.securitytracker.com/id?1027008 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2012-0358
https://notcve.org/view.php?id=CVE-2012-0358
Buffer overflow in the Cisco Port Forwarder ActiveX control in cscopf.ocx, as distributed through the Clientless VPN feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 through 7.2 before 7.2(5.6), 8.0 before 8.0(5.26), 8.1 before 8.1(2.53), 8.2 before 8.2(5.18), 8.3 before 8.3(2.28), 8.2 before 8.4(2.16), and 8.6 before 8.6(1.1), allows remote attackers to execute arbitrary code via unspecified vectors, aka Bug ID CSCtr00165. Desbordamiento de búfer en el puerto de Cisco Forwarder control ActiveX en cscopf.ocx, ya que distribuyen a través de la función Clientless VPN de Cisco Adaptive Security Appliances (ASA) 5500 dispositivos de la serie con el software v7.0 a v7.2 antes de v7.2 (5.6), v8.0 antes de v8.0 (5.26), v8.1 antes de v8.1 (2.53), v8.2 antes de v8.2 (5.18), v8.3 antes de v8.3 (2.28), v8.2 antes de v8.4 (2.16), y v8.6 antes de v8.6 (1.1), permite a atacantes remotos ejecutar código arbitrario a través de vectores no especificados, también conocido como Bug ID CSCtr00165. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asaclient http://www.kb.cert.org/vuls/id/339177 http://www.securitytracker.com/id?1026799 https://exchange.xforce.ibmcloud.com/vulnerabilities/74027 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-0354
https://notcve.org/view.php?id=CVE-2012-0354
The Threat Detection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.0 through 8.2 before 8.2(5.20), 8.3 before 8.3(2.29), 8.4 before 8.4(3), 8.5 before 8.5(1.6), and 8.6 before 8.6(1.1) allows remote attackers to cause a denial of service (device reload) via (1) IPv4 or (2) IPv6 packets that trigger a shun event, aka Bug ID CSCtw35765. La función de detección de amenazas de dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500, y el ASA Services Module (ASASM) en dispositivos Cisco Catalyst 6500, con el software v8.0 a v8.2 antes de v8.2 (5.20), v8.3 antes de v8.3 (2.29), v8.4 antes de v8.4 (3), v8.5 antes de v8.5 (1.6), y v8.6 antes de v8.6 (1.1) permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de paquetes (1) IPv4 o (2) IPv6 que desencadenan un evento shun, también conocido como Bug ID CSCtw35765. • http://osvdb.org/80044 http://secunia.com/advisories/48423 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-asa http://www.securityfocus.com/bid/52489 http://www.securitytracker.com/id?1026800 https://exchange.xforce.ibmcloud.com/vulnerabilities/74030 • CWE-20: Improper Input Validation •