You are here

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

August 9, 2012 - 7:00am

Addthis

PROBLEM:

Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

PLATFORM:

Version(s): ASA 5500 Series; 8.2 - 8.4

ABSTRACT:

Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

reference LINKS:

Release Notes for the Cisco ASA 5500 Series, 8.4(x)
SecurityTracker Alert ID: 1027355
CVE-2012-2472
CVE-2012-2474

IMPACT ASSESSMENT:

Medium

Discussion:

Two vulnerabilities were reported in Cisco ASA.
1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical pre-allocated secondary pinholes and cause excessive CPU consumption [CVE-2012-2472]. Cisco has assigned Bug ID CSCtz63143 to this vulnerability.

2. A remote authenticated user can exploit a flaw in the clientless WebVPN feature to consume excessive memory on the target system [CVE-2012-2474]. Cisco has assigned Bug ID CSCth34278 to this vulnerability.

Impact:

A remote user can cause excessive memory consumption on the target system.

A remote authenticated user can cause excessive CPU consumption on the target system.

Solution:

Release Notes for the Cisco ASA 5500 Series, 8.4(x)

Addthis