7.1
CVSSv2

CVE-2010-2821

Published: 09/08/2010 Updated: 09/08/2010
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
VMScore: 632
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

Unspecified vulnerability on the Cisco Firewall Services Module (FWSM) with software 3.2 prior to 3.2(17.2), 4.0 prior to 4.0(11.1), and 4.1 prior to 4.1(1.2) for Catalyst 6500 series switches and 7600 series routers, when multi-mode is enabled, allows remote malicious users to cause a denial of service (device reload) via crafted (1) Telnet, (2) SSH, or (3) ASDM traffic over TCP, aka Bug ID CSCtg68694.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco firewall_services_module_software 4.0

cisco firewall_services_module_software 4.0\\(4\\)

cisco firewall_services_module_software 4.0\\(6\\)

cisco firewall_services_module_software 4.0\\(7\\)

cisco firewall_services_module_software 3.2\\(13\\)

cisco firewall_services_module_software 3.2\\(14\\)

cisco firewall_services_module_software 3.2\\(16\\)

cisco firewall_services_module_software 3.2\\(1\\)

cisco firewall_services_module_software 3.2\\(3\\)

cisco firewall_services_module_software 4.0\\(8\\)

cisco firewall_services_module_software 4.1\\(1\\)

cisco firewall_services_module_software 3.2

cisco firewall_services_module_software 3.2\\(2\\)

cisco firewall_services_module_software 4.0\\(10\\)

cisco firewall_services_module_software 4.1

cisco firewall_services_module

Vendor Advisories

Multiple vulnerabilities exist in the Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers that may cause the Cisco FWSM to reload after processing crafted SunRPC or certain TCP packets Repeated exploitation could result in a sustained DoS condition Cisco has released softwar ...