Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65593 | vdb entry |
http://www.securitytracker.com/id?1025108 | vdb entry |
http://www.securityfocus.com/bid/46518 | vdb entry |
http://www.vupen.com/english/advisories/2011/0494 | vdb entry |
http://secunia.com/advisories/43453 | third party advisory |
http://secunia.com/advisories/43488 | third party advisory |
http://www.vupen.com/english/advisories/2011/0493 | vdb entry |
http://www.securitytracker.com/id?1025109 | vdb entry |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml | vendor advisory |