You are here
Home > Preporuke > Ranjivost Cisco Adaptive Security Appliance softvera

Ranjivost Cisco Adaptive Security Appliance softvera

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Adaptive Security Appliance Direct Memory Access Denial of Service Vulnerability

Advisory ID: cisco-sa-20181003-asa-dma-dos

Revision: 1.0

For Public Release: 2018 October 3 16:00 GMT

Last Updated: 2018 October 3 16:00 GMT

CVE ID(s): CVE-2018-15383

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary

=======

A vulnerability in the cryptographic hardware accelerator driver of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a temporary denial of service (DoS) condition.

The vulnerability exists because the affected devices have a limited amount of Direct Memory Access (DMA) memory and the affected software improperly handles resources in low-memory conditions. An attacker could exploit this vulnerability by sending a sustained, high rate of malicious traffic to an affected device to exhaust memory on the device. A successful exploit could allow the attacker to exhaust DMA memory on the affected device, which could cause the device to reload and result in a temporary DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-dma-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-dma-dos”]

—–BEGIN PGP SIGNATURE—–
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=uQv5
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Ranjivost Cisco HyperFlex softvera

Otkrivena je ranjivost Cisco HyperFlex softvera uzrokovana postojanjem fiksnog ključa za digitalno potpisivanje. Potencijalni udaljeni napadač bi mogao iskoristiti ranjivost...

Close