ID CVE-2008-3817
Summary Memory leak in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 8.0 before 8.0(4) and 8.1 before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via an unspecified sequence of packets, related to the "initialization code for the hardware crypto accelerator."
References
Vulnerable Configurations
  • cpe:2.3:h:cisco:adaptive_security_appliance_5500_series
    cpe:2.3:h:cisco:adaptive_security_appliance_5500_series
  • cpe:2.3:h:cisco:pix_security_appliance:8.0
    cpe:2.3:h:cisco:pix_security_appliance:8.0
  • cpe:2.3:h:cisco:pix_security_appliance:8.1
    cpe:2.3:h:cisco:pix_security_appliance:8.1
CVSS
Base: 7.8 (as of 24-10-2008 - 13:11)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
oval via4
accepted 2008-12-08T04:00:54.883-05:00
class vulnerability
contributors
name Yuzheng Zhou
organization Hewlett-Packard
description Memory leak in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 8.0 before 8.0(4) and 8.1 before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via an unspecified sequence of packets, related to the "initialization code for the hardware crypto accelerator."
family pixos
id oval:org.mitre.oval:def:5597
status accepted
submitted 2008-05-26T11:06:36.000-04:00
title Cisco ASA and PIX Crypto Accelerator Memory Leak Vulnerability
version 2
refmap via4
bid 31865
cisco 20081022 Multiple Vulnerabilities in Cisco PIX and Cisco ASA
sectrack 1021088
secunia 32392
vupen ADV-2008-2899
xf cisco-asa-cryptoaccelerator-dos(46027)
Last major update 07-03-2011 - 22:11
Published 23-10-2008 - 18:00
Last modified 28-09-2017 - 21:31
Back to Top