CVE-2013-5512 (CNNVD-201310-240)

HIGH
中文标题:
Cisco ASA软件HTTP Deep Packet Inspection功能拒绝服务漏洞
英文标题:
Race condition in the HTTP Deep Packet Inspection (DPI) feature in Cisco Adaptive Security Appliance...
CVSS分数: 7.1
发布时间: 2013-10-13 10:00:00
漏洞类型: 竞争条件问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Adaptive Security Appliances(ASA,自适应安全设备)Software是美国思科(Cisco)公司的一套运行于防火墙中的操作系统。 Cisco ASA软件中的HTTP Deep Packet Inspection (DPI)功能中存在拒绝服务漏洞。该漏洞源于当HTTP DPI引擎检测HTTP报文时,没有正确处理竞争条件。成功利用此漏洞要求启用了spoof-server参数选项或配置了Cisco ASA软件来检测和屏蔽包含active-x或java-applet的HTTP响应。远程攻击者可通过发送特制的HTTP响应利用该漏洞造成拒绝服务(设备重启)。以下版本受到影响Cisco Adaptive Security Appliance Software 8.2(5.46)之前的8.2.x版本,8.3(2.39)之前的8.3.x版本,8.4(5.5)之前的8.4.x版本,8.5(1.18)之前的8.5.x版本,8.6(1.12)之前的8.6.x版本,8.7(1.4)之前的8.7.x版本,9.0(1.4)之前的9.0.x版本,9.1(1.2)之前的9.1.x版本。

英文描述:

Race condition in the HTTP Deep Packet Inspection (DPI) feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(5.5), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.4), 9.0.x before 9.0(1.4), and 9.1.x before 9.1(1.2), in certain conditions involving the spoof-server option or ActiveX or Java response inspection, allows remote attackers to cause a denial of service (device reload) via a crafted HTTP response, aka Bug ID CSCud37992.

CWE类型:
CWE-362
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco adaptive_security_appliance_software 8.2 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(1\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(1\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(2\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(2\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(3\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(3\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(3.9\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(3.9\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(4\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(4\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(4.1\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(4.1\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(4.4\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(4.4\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(5\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(5\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(5.35\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(5.35\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.2\(5.38\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\(5.38\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.3\(1\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(1\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.3\(2\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(2\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.3\(2.34\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(2.34\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.3\(2.37\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\(2.37\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.4 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.4\(1\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(1\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.4\(1.11\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(1.11\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.4\(2\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(2\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.4\(2.11\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(2.11\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.4\(3\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(3\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.4\(4.11\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(4.11\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.4\(5\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\(5\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.5 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.5\(1\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\(1\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.5\(1.17\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\(1.17\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.6 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.6\(1\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\(1\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.6\(1.3\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\(1.3\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.6\(1.10\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\(1.10\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 8.7\(1.3\) - - cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\(1.3\):*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 9.0 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*
cisco adaptive_security_appliance_software 9.1 - - cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20131213 HTTP Deep Packet Inspection Denial of Service Vulnerability vendor-advisory
cve.org
访问
20131009 Multiple Vulnerabilities in Cisco ASA Software vendor-advisory
cve.org
访问
CVSS评分详情
7.1
HIGH
CVSS向量: AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS版本: 2.0
机密性
NONE
完整性
NONE
可用性
COMPLETE
时间信息
发布时间:
2013-10-13 10:00:00
修改时间:
2024-08-06 17:15:20
创建时间:
2025-11-11 15:33:38
更新时间:
2025-11-11 15:50:58
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2013-5512 2025-11-11 15:18:39 2025-11-11 07:33:38
NVD nvd_CVE-2013-5512 2025-11-11 14:54:16 2025-11-11 07:42:25
CNNVD cnnvd_CNNVD-201310-240 2025-11-11 15:09:23 2025-11-11 07:50:58
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:50:58
vulnerability_type: 未提取 → 竞争条件问题; cnnvd_id: 未提取 → CNNVD-201310-240; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 竞争条件问题
  • cnnvd_id: 未提取 -> CNNVD-201310-240
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:25
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.1; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:N/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 33; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.1
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:N/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 33
  • data_sources: ['cve'] -> ['cve', 'nvd']