First published: Wed Apr 23 2014(Updated: )
Cisco IOS before 12.2(50)SY1 allows remote authenticated users to cause a denial of service (memory consumption) via a sequence of VTY management sessions (aka exec sessions), aka Bug ID CSCtn43662.
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2\(33\)sxi4 | |
Cisco IOS | =12.2\(33\)sxi5 | |
Cisco IOS | =12.2\(33\)sxi6 | |
Cisco IOS | =12.2\(33\)sxi7 | |
Cisco IOS | =12.2\(33\)sxj | |
Cisco IOS | =12.2\(50\)sy | |
=12.2\(33\)sxi4 | ||
=12.2\(33\)sxi5 | ||
=12.2\(33\)sxi6 | ||
=12.2\(33\)sxi7 | ||
=12.2\(33\)sxj | ||
=12.2\(50\)sy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5036 has a severity rating that indicates a significant risk of denial of service due to memory consumption.
To fix CVE-2012-5036, upgrade to Cisco IOS version 12.2(50)SY1 or later.
CVE-2012-5036 affects Cisco IOS versions prior to 12.2(50)SY1, specifically the 12.2(33) series.
CVE-2012-5036 is a denial of service vulnerability caused by excessive memory consumption in VTY management sessions.
Yes, remote authenticated users can exploit CVE-2012-5036 by initiating a sequence of VTY management sessions.