Memory leak in the connection-manager implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1(.3) and earlier allows remote attackers to cause a denial of service (multi-protocol management outage) by making multiple management session requests, aka Bug ID CSCug33233.
References
Link | Resource |
---|---|
http://osvdb.org/100682 | Broken Link |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6707 | Broken Link Vendor Advisory |
http://tools.cisco.com/security/center/viewAlert.x?alertId=32065 | Vendor Advisory |
http://www.securityfocus.com/bid/64148 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1029441 | Broken Link Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/89442 | Third Party Advisory VDB Entry |
http://osvdb.org/100682 | Broken Link |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6707 | Broken Link Vendor Advisory |
http://tools.cisco.com/security/center/viewAlert.x?alertId=32065 | Vendor Advisory |
http://www.securityfocus.com/bid/64148 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1029441 | Broken Link Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/89442 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/100682 - Broken Link | |
References | () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6707 - Broken Link, Vendor Advisory | |
References | () http://tools.cisco.com/security/center/viewAlert.x?alertId=32065 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/64148 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1029441 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/89442 - Third Party Advisory, VDB Entry |
23 May 2022, 16:24
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-772 | |
CPE | cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(1.11\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.6\(1.10\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1\(1.7\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.5\(1.4\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.5\(1.17\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1\(2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.6\(1.3\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(3\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7\(1.1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(6\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0\(3\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.6\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(2.11\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.5\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(4.11\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.7\(1.3\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0.3\(6\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.0\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:adaptive_security_appliance_software:8.4\(5\):*:*:*:*:*:*:* |
|
References | (CISCO) http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6707 - Broken Link, Vendor Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1029441 - Broken Link, Third Party Advisory, VDB Entry | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/89442 - Third Party Advisory, VDB Entry | |
References | (OSVDB) http://osvdb.org/100682 - Broken Link |
Information
Published : 2013-12-07 05:33
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6707
Mitre link : CVE-2013-6707
CVE.ORG link : CVE-2013-6707
JSON object : View
Products Affected
cisco
- adaptive_security_appliance_software
CWE
CWE-772
Missing Release of Resource after Effective Lifetime