Skip to main content

Cisco ASA Multiple Vulnerabilities

Last Update Date: 11 Oct 2012 11:42 Release Date: 11 Oct 2012 4848 Views

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

TYPE: Security Software & Appliance

Multiple vulnerabilities have been identified in Cisco ASA. A remote user can execute arbitrary code on the target system, and cause denial of service conditions.

  1. A remote user can send specially crafted DHCP data via IPv4 to the DHCP server on the target device or through the target device to trigger a memory allocation error and cause the target device to reload.
  2. A remote user can send a specially crafted response to an AAA challenge via IPv4 on an SSL VPN connection to cause the target device to reload. Cisco ASA Software configured for Clientless or AnyConnect SSL VPN is affected. IPsec VPN Server, IPSEC/L2TP VPN Server, or IKEv2 AnyConnect server configurations are not affected.
  3. A remote user can send specially crafted SIP packets (as part of an established SIP session) through the target device to cause the target device to reload.
  4. A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to reload.

Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • ASA 5500 Series, Cisco Catalyst 6500 Series ASA Services Module

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link