You are here
Home > Preporuke > Sigurnosni nedostataci Cisco Web Security Appliance (WSA) proizvoda

Sigurnosni nedostataci Cisco Web Security Appliance (WSA) proizvoda

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Web Security Appliance Range Request Denial of Service Vulnerability

Advisory ID: cisco-sa-20151104-wsa2

Revision 1.0

For Public Release 2015 November 4 16:00 UTC (GMT)

+———————————————————————

Summary
=======

A vulnerability in the file-range request functionality of Cisco AsyncOS
for Cisco Web Security Appliance (WSA) could allow an unauthenticated,
remote attacker to cause a denial of service (DoS) condition on an
appliance because the appliance runs out of system memory.

The vulnerability is due to a failure to free memory when a file range
is requested through the Cisco WSA. An attacker could exploit this
vulnerability by opening multiple connections that request file ranges
through the WSA. A successful exploit could allow the attacker to cause
the WSA to stop passing traffic when enough memory is used and not freed.

Cisco has released software updates that address this vulnerability.
A workaround that mitigates this vulnerability is also available.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa2

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1.4.5 (SunOS)
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=TsjI
—–END PGP SIGNATURE—–

 

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA1

 

Cisco Web Security Appliance Cache Reply Denial of Service Vulnerability

 

Advisory ID: cisco-sa-20151104-wsa1

 

Revision 1.0

 

For Public Release 2015 November 4 16:00 UTC (GMT)

 

+———————————————————————

 

Summary

=======

 

A vulnerability in the proxy cache functionality of Cisco AsyncOS for 

Cisco Web Security Appliance (WSA) could allow an unauthenticated, 

remote attacker to cause a denial of service (DoS) condition because 

the device runs out of system memory.

 

The vulnerability is due to improper memory operations by the affected 

software. The software fails to free a memory object when it retrieves 

data from the proxy server cache to terminate a TCP connection. An 

attacker could exploit this vulnerability by opening many proxy 

connections through the WSA. An exploit could allow the attacker to 

cause the WSA to stop passing traffic when enough memory is leaked.

 

Cisco has released software updates that address this vulnerability. 

A workaround that mitigates this vulnerability is also available.

 

This advisory is available at the following link:

 

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-wsa1

 

—–BEGIN PGP SIGNATURE—–

Version: GnuPG v1.4.5 (SunOS)

 

iQIVAwUBVjU+cYpI1I6i1Mx3AQI+ww//RagxLWcIsbnUqMk4yZ0BZmSMjcpNqgUp

CLz5cIhCX3P4/6kK0mc1ad3o6LtqFeMCc0cooj6p83+CfeatAfdg8A65HrJ8Pp8S

5JimnhoAtMkAQUrUJJ0ch/mB4TMMhAGHSNnfBoleDhzn2Cc6uvk9MMNds5ERwU0z

HHRq+kpVSzawf9LJpWpauf1RulXxH5KgsuQ7eeSqCdRGPGrH5Eg3FyA4O0DrACf4

FlgTvjz2qcXiwneQtOZ/eTD7N18YNgh3c/IqIwjWTDTJCUmEXRNfgDjZFP0aDv9f

6qhDJh2D18Fdh+EA+Y0iVUXP6r7HJrASM2qAqqJPSoawheyCZx48+gi5+QB/p7Ds

M2MR6EgblF8DQcZHByMF7k8HCCMZEZu8PIqOwLQfI4v40qTTsKP4g4+IngdaGZ7h

dFkM+93cpk+GbZIc7ATaePxnzA9l6T77eSYnfxIxHPHSZShU43W4W+mubyZyjeEz

dwUPWv9Dm9uvZjH375aBmVFzxcdttXPSHq7iatpguEeojUGOl2kFRU4FYdPLx54b

B4AMxlkwq73vhCEgoHjQ+pLMo3ep9tMjegfs0TlRwCi3lh8fBCzUojdMSJaQS8+V

8ipBwfieLRKHIDH8cV6y1FFKMmKc5tvb5yvXJnbXO+kltDhC9SpjKtqFkY7P7gV4

EpOZS1OWeE8=

=jTdT

—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2015-11-0016-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Nadogradnja za firefox

Izdana je nadogradnja za otklanjanje višestrukih ranjivosti u web pregledniku Firefox za Ubuntu. Zahvaćene su razne komponente preglednika, a ovisno...

Close