Lucene search

K
ciscoCiscoCISCO-SA-20130919-CVE-2012-4083
HistorySep 19, 2013 - 5:11 p.m.

Cisco Unified Computing System Fabric Interconnect String Overflow Vulnerability

2013-09-1917:11:43
tools.cisco.com
24

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

EPSS

0.002

Percentile

64.8%

A vulnerability in the administrative web interface of the Cisco Unified Computing System could allow an authenticated, remote attacker to create a denial of service (DoS) condition.

The vulnerability is due to improper parameter input validation. An attacker could exploit this vulnerability by setting the string value of certain parameters to a value larger than the input buffer. A successful exploit could allow the attacker to corrupt the parameters values in the administrative web interface causing administrative sessions to be terminated.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker would need to authenticate to a targeted device which may reside on trusted, internal networks in which the attacker would need access to. These access requirements limits the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscounified_computing_systemMatchany
OR
ciscounified_computing_systemMatchany
VendorProductVersionCPE
ciscounified_computing_systemanycpe:2.3:h:cisco:unified_computing_system:any:*:*:*:*:*:*:*

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

EPSS

0.002

Percentile

64.8%

Related for CISCO-SA-20130919-CVE-2012-4083