You are here
Home > Preporuke > Sigurnosni nedostatak fpsnort komponente

Sigurnosni nedostatak fpsnort komponente

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Firepower Detection Engine HTTP Denial of Service Vulnerability

Advisory ID: cisco-sa-20161019-fpsnort

Revision 1.0

For Public Release 2016 October 19 16:00 UTC (GMT)

+———————————————————————

Summary
=======

A vulnerability in the detection engine reassembly of HTTP packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting.

The vulnerability is due to improper handling of an HTTP packet stream. An attacker could exploit this vulnerability by sending a crafted HTTP packet stream to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1.4.5 (SunOS)

iQIVAwUBV/5H0a89gD3EAJB5AQK4Fg//cVlNIwP+3veCAVii9Xt7fklj6O6KrRik
pmQGiAAAVSaEoQ3XiNtmx52q1lMrOhrGOIVgdY8Uu/T2ofb+ah3Fzrcyk67XjjmM
6LckmT1gRHCU4qehWbxdpW8eSJsjkp7bSHNbQQmxeuZVqr1bpQxQI0CJe2JVE1fO
jmVlBmhQ9Kb5JQPkM5JalK5/7d9RgrCZByxX80YfFHigPRwFp+7blHt8tzIzKZUa
8m4f5f5Gtj3U2Ox39AYmKQIeWgpqmaxz3TTWh7hZhdRL3E9MA+tPzMllgm4JKvqn
CA334kPlwrLZkTH6FNlNNvGlkxb8H8kZJ4jinp73oIB35ILYFKj8PbhyEBUDzV/1
7mv3KuwOzmJ9Yr9ZoXYs3rJxduPTLfXMiUgWKBsYQp+tQ/yS4+o3Uo/44cNn/kzU
hx9UjoyV4WGzq2t/tFtbaEzWYMI6yhB/D4dDfixAz7bHC+kksvlzBCFgJfmthXwk
ncNrnhjKlqT/f8YrRT4U6Qw1V1QelpbC2N8Zgs2Bin5ZKxoQ0uqWhYYvJIOvPGSQ
1XAkq/xCWelcTyPhZwyKlQxFgXH7/vXy8NQkmAw338/xqgWD5CtUqXsuypYDpxVc
/RX1rjOHTsPrcHpBubXUOt3uokHF5f4XbE4ZAn/vzZM4wtHzo0v1PjfwkaHM/y8j
5G+18M5ADlQ=
=H5oS
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorMarko Stanec
Cert idNCERT-REF-2016-10-0135-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa java-1.8.0-openjdk

Otkriveni su sigurnosni nedostaci u programskom paketu java-1.8.0-openjdk za operacijski sustav Red Hat. Otkriveni nedostaci potencijalnim napadačima omogućuju zaobilaženje sigurnosnog...

Close