CVE-2013-5542 Details

CVE-2013-5542

Published: 2013-10-21
Last Modified: 2013-10-21
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.2), 8.7 before 8.7(1.8), 9.0 before 9.0(3.6), and 9.1 before 9.1(2.8) allows remote attackers to cause a denial of service (firewall-session disruption or device reload) via crafted ICMP packets, aka Bug ID CSCui77398.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.5/10
Exploit Score 10/10
Access Vector Network
Access Complexity Low
Authentication None
Impact Score 7.8/10
Confidentiality Impact None
Availability Impact Complete
Integrity Impact Partial
Vector String AV:N/AC:L/Au:N/C:N/I:P/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0\(1\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0\(2\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0\(3\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7\(1.1\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7\(1.3\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1\(1\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1\(1.7\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1\(2\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(1\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(1.11\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(2\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(2.11\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(3\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(4.11\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(5\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(6\):*:*:*:*:*:*:* Yes - -
References

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa

CVE ID
CVE-2013-5542
Published
2013-10-21
Modified
2013-10-21
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-399

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.