Cisco Firewall Services Module Security Bypass and Denial of Service Vulnerabilities
Last Update Date:
7 Oct 2011 15:10
Release Date:
7 Oct 2011
5846
Views
RISK: High Risk
TYPE: Security software and application - Security Software & Appliance
Multiple vulnerabilities have been identified in Cisco Firewall Services Module (FWSM), which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).
- An error in the implementation of the system log message ID 302015 when generating a log message for IPv6 traffic can be exploited to cause a memory corruption.
Successful exploitation of this vulnerability requires that the FWSM has interfaces with IPv6 addresses.
- An error in the authentication proxy feature during a high number of network access authentication requests related to the "aaa authentication match" and "aaa authentication include" commands can be exploited to cause a crash.
- An error in the TACACS+ implementation can be exploited to bypass the TACACS+ authentication mechanism.
- Four errors in the SunRPC inspection engine while processing certain SunRPC messages can be exploited to reload a device via specially crafted SunRPC packets that transit the appliance.
- An error in the ILS inspection engine while processing certain ILS messages can be exploited to reload a device via specially crafted ILS packets that transit the appliance.
Impact
- Denial of Service
- Security Restriction Bypass
System / Technologies affected
- Cisco Firewall Services Module (FWSM) 3.x
- Cisco Firewall Services Module (FWSM) 4.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 3.1(21), 3.2(22), 4.0(16), or 4.1(7).
Vulnerability Identifier
- CVE-2011-3296
- CVE-2011-3297
- CVE-2011-3298
- CVE-2011-3299
- CVE-2011-3300
- CVE-2011-3301
- CVE-2011-3302
- CVE-2011-3303
Source
Related Link
Share with