First published: Wed Jun 20 2012(Updated: )
Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 8.4 before 8.4(4.1), 8.5 before 8.5(1.11), and 8.6 before 8.6(1.3) allow remote attackers to cause a denial of service (device reload) via IPv6 transit traffic that triggers syslog message 110003, aka Bug ID CSCua27134.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =8.4 | |
Cisco Adaptive Security Appliance Software | =8.4\(1\) | |
Cisco Adaptive Security Appliance Software | =8.4\(1.11\) | |
Cisco Adaptive Security Appliance Software | =8.4\(2\) | |
Cisco Adaptive Security Appliance Software | =8.4\(2.11\) | |
Cisco Adaptive Security Appliance Software | =8.5 | |
Cisco Adaptive Security Appliance Software | =8.5\(1\) | |
Cisco Adaptive Security Appliance Software | =8.5\(1.4\) | |
Cisco Adaptive Security Appliance Software | =8.6 | |
Cisco Adaptive Security Appliance 5500 | ||
Cisco Catalyst 6500-E | ||
cisco catalyst 6503-e firmware | ||
Cisco Catalyst 6504-E Firmware | ||
Cisco Catalyst 6506-E Firmware | ||
Cisco Catalyst 6509-E Firmware | ||
Cisco Catalyst 6509-NEB-A Firmware | ||
Cisco Catalyst 6509-V-E | ||
Cisco Catalyst 6513 | ||
Cisco Catalyst 6513 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3058 is classified as a high severity vulnerability, primarily due to its ability to cause a denial of service.
To fix CVE-2012-3058, update your Cisco Adaptive Security Appliance software to versions 8.4(4.1), 8.5(1.11), or 8.6(1.3) or later.
CVE-2012-3058 affects Cisco Adaptive Security Appliances 5500 series and ASA Services Module on Cisco Catalyst 6500 series devices running specified vulnerable software versions.
The impact of CVE-2012-3058 is that remote attackers can exploit it to trigger a device reload, leading to service interruptions.
CVE-2012-3058 exploits vulnerabilities related to the handling of IPv6 traffic, allowing for remote denial of service attacks.