-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2012-0092 Title: Cisco ASA 5500 Series Denial of Service Vulnerability [1] Version history: 09.08.2012 Initial publication Summary ======= The Cisco Adaptive Security Appliance (ASA) 5500 Series is prone to a remote denial-of-service vulnerability. Successful exploits may allow an attacker to cause excessive memory consumption, resulting in a denial- of-service condition. CVE-2012-2474 CVSS v2 Base Score:4.0 (MEDIUM) (AV:N/AC:L/Au:S/C:N/I:N/A:P) [2,3] Vulnerable systems ================== Cisco ASA 5500 Series Adaptive Security Appliance 8.4 Cisco ASA 5500 Series Adaptive Security Appliance 8.3 Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Original Details ================ Memory leak on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2 through 8.4 allows remote authenticated users to cause a denial of service (memory consumption and blank response page) by using the clientless WebVPN feature, aka Bug ID CSCth34278. [2] What can you do? ================ This issue being tracked by Cisco bug ID CSCth34278. Vendor updates are available [1] What to tell your users? ======================== N/A More information ================ [1]http://www.securityfocus.com/bid/54840/info [2]http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2474 [3]Information about CVSS: http://www.first.org/cvss/cvss-guide.html Best regards, CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 Privacy Statement: http://cert.europa.eu/cert/plainedition/en/cert_privacy.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJQI22hAAoJEMQ9UMldbd3zkccP/1hP9//HTgAVBIidHBBklS2Z qcmiwUMI+S7YwepvjrIlM8n562jMmAv9HqGcegS291SyBSZxPlJhOLrpA6zBI5g/ z+FpoGmshi15GikOoShpyrhTv4NC6Qe3Mm7SU6ijzVYGqiDYWXAO7LpSWNHTK5gv sxGKEnKOvMrwfXWBsvLNmh4Cnhf3wfGobLo2o1y8ZZLvVCGH0Ca5PYY84DUevwhs nmtcNjC4tm4NTZTDkCXAGP80q2gjj5dpgzgvOQgysplEHCxapbgDgUZ5tGCaJPB5 vL7rI+gSiJC+IrFTEoPt9xmYcXc/DGnud79SgG0Ii9BvKV0rGf38GajH+Suod1AN c+hR7LlVio+BJPGJfev810XoeMLjT3FXuiCx7MIGxNaGGtEJEij912N39L6FJFY2 QoUv3eklUp3wcD+PShpNVy0+4usFiU+yDLUVSUBxu+SHtB+HCMvQOtPzmFDnuyZ4 Eg6s0mEmfLJPCqD/sSNs7islYm14WA/FcYmXKWEd1/IZ1oImdycw8J2Spqcvod/b bTLawKWTv0FVx7gjBAJT4PjLPByLICP8PBK3vs1KSohaO3gvM4GDLXAhJVHV2oPi lC//VqfDs9RCXqxoNOZECLH3AVLuNF54bKigRp4BrjeqmCpNhZu3PSAmV6DAWe6M +vwr0kq0r2b52Y8RyyD1 =/pOW -----END PGP SIGNATURE-----