[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Software
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Software
- From: Cisco Systems Product Security Incident Response Team <psirt@xxxxxxxxx>
- Date: Thu, 17 Oct 2013 12:02:49 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Software
Advisory ID: cisco-sa-20131009-asa
Revision 2.0
Last Updated 2013 October 17 16:00 UTC (GMT)
For Public Release 2013 October 9 16:00 UTC (GMT)
Summary
=======
Cisco Adaptive Security Appliance (ASA) Software is affected by the following
vulnerabilities:
IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability
SQL*Net Inspection Engine Denial of Service Vulnerability
Digital Certificate Authentication Bypass Vulnerability
Remote Access VPN Authentication Bypass Vulnerability
Digital Certificate HTTP Authentication Bypass Vulnerability
HTTP Deep Packet Inspection Denial of Service Vulnerability
DNS Inspection Denial of Service Vulnerability
AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability
Clientless SSL VPN Denial of Service Vulnerability
Crafted ICMP Packet Denial of Service Vulnerability
These vulnerabilities are independent of one another; a release that is
affected by one of the vulnerabilities may not be affected by the others.
Successful exploitation of the IPsec VPN Crafted ICMP Packet Denial of Service
Vulnerability, SQL*Net Inspection Engine Denial of Service Vulnerability, HTTP
Deep Packet Inspection Denial of Service Vulnerability, DNS Inspection Denial
of Service Vulnerability, and Clientless SSL VPN Denial of Service
Vulnerability may result in a reload of an affected device, leading to a denial
of service (DoS) condition.
Successful exploitation of the Digital Certificate Authentication Bypass
Vulnerability, Remote Access VPN Authentication Bypass Vulnerability, and
Digital Certificate HTTP Authentication Bypass Vulnerability may result in an
authentication bypass, which could allow the attacker access to the inside
network via remote access VPN or management access to the affected system via
the Cisco Adaptive Security Device Management (ASDM).
Successful exploitation of the AnyConnect SSL VPN Memory Exhaustion Denial of
Service Vulnerability may exhaust available memory, which could result in
general system instability and cause the affected system to become unresponsive
and stop forwarding traffic.
Successful exploitation of the Crafted ICMP Packet Denial of Service
Vulnerability may cause valid connections to drop that are passing through the
affected system, or cause a reload of the system, leading to a denial of
service (DoS) condition.
Cisco has released free software updates that address these vulnerabilities.
Workarounds are available for some of the vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa
Note: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series
Switches and Cisco 7600 Series Routers may be affected by the SQL*Net
Inspection Engine Denial of Service Vulnerability. A separate Cisco Security
Advisory has been published to disclose the vulnerabilities that affect the
Cisco FWSM. This advisory is available at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.20 (Darwin)
iF0EAREKAAYFAlJgBC8ACgkQUddfH3/BbToDOAD8D9ORwOL4lSRbCaSewo8YA65y
FwQ4b5gDNLA3LkZPU48A+KqSpKNS9y6akZnHQMwOsaCFiQAI3Yd2cjEIoyhETjA=
=BJqj
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/