You are here
Home > Preporuke > Ranjivost Cisco Firepower Detection mehanizma

Ranjivost Cisco Firepower Detection mehanizma

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Firepower Detection Engine SSL Decryption Memory Consumption Denial of Service Vulnerability

Advisory ID: cisco-sa-20171004-ftd

Revision: 1.0

For Public Release: 2017 October 4 16:00 GMT

Last Updated: 2017 October 4 16:00 GMT

CVE ID(s): CVE-2017-12245

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary
=======
A vulnerability in SSL traffic decryption for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause depletion of system memory. If this memory leak persists over time, a denial of service (DoS) condition could develop because traffic can cease to be forwarded through the device.

The vulnerability is due to an error in how the Firepower Detection Snort Engine handles SSL traffic decryption and notifications to and from the Adaptive Security Appliance (ASA) handler. An attacker could exploit this vulnerability by sending a steady stream of malicious Secure Sockets Layer (SSL) traffic through the device. An exploit could allow the attacker to cause a DoS condition when the device runs low on system memory.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd”]

—–BEGIN PGP SIGNATURE—–

iQKBBAEBAgBrBQJZ1QWNZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg
SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx
NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHknFQ/6A6oiOETh62QlFM0z
GKecCEO46VvfNkiW3C7O/gGtSTVz6uwdiTyJKSAO1NWvxrFKihxL9lZxKRwXxbFf
+LPXfz6lFEN1FIMYWubG3U5LEIH+dzg7883Oa809g4se3cnufQ3R76CleGJixrTi
qJAHDIgOXBH2hV1gOkBFgPkrz4CVBXV08bZi4g0zxxDs2mkHjIZhEBOwQjl8yuAu
067n4oqGSLf/jwIAWJKdZkcfIfEWpXZsAbaYoiSrvmQV3pWLGyH3ETxVxnfIPzM5
drwJuW4bSeR60c1iOC4ncwLmfqVgTpm4aOg33aZoqcNa0Ec0F+ot7LreZpJlxUH/
R1h9QscgyEqyDhuPU4y4LHrDJlxAKeogDuWaIrCb/FC4YO+zA+k8c5gKqj6hpzQP
DFuQ3n+SPmsEKKmyRMeE6IYZDWa9uiluahkgzVHlAFDo3lgP/UX6y1yDAIJdiVg2
34EmePTwBnG0wCpr32GFDDM++o7KfKflJ0oHgZHAq9quDL7tXh5qzhjGZiz28a/a
z7gPoOCl9dwSQIXlaoJflpGeUvDmBmjDIAmDzVgbdwFOajWIJWBr3qBD/ltdoYm8
3/7TfocNLXp2gxr3LVbRjQf838bohaJc4TUT9gmIm7ZlBqxkiaW86nGJZt0QSNKt
d1C/oqCMS4z57We2MHP7HHJjkNs=
=pXFu
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-10-0029-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost Cisco License Manager softvera

Otkrivena je ranjivost u web sučelju Cisco License Manager softvera. Ranjivost je uzrokovana neodgovarajućom obradom ulaznih parametara HTTP zahtjeva koji...

Close