SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Cisco Firewall Services Module Vendors:   Cisco
Cisco Firewall Services Module IKE and Auth-Proxy Bugs Let Remote Users Deny Service
SecurityTracker Alert ID:  1028416
SecurityTracker URL:  http://securitytracker.com/id/1028416
CVE Reference:   CVE-2013-1149, CVE-2013-1155   (Links to External Site)
Date:  Apr 10 2013
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.1, 3.2, 4.0, 4.1
Description:   Two vulnerabilities were reported in Cisco Firewall Services Module. A remote user can cause denial of service conditions.

A remote user can send a specially crafted IKEv1 message to the target system to cause the target device to reload [CVE-2013-1149].

Cisco has assigned Cisco bug ID CSCud20267 to this vulnerability.

A remote user can send a specially crafted URL to trigger a flaw in the auth-proxy feature and cause the target device to reload [CVE-2013-1155].

Cisco has assigned Cisco bug ID CSCtg02624 to this vulnerability.

The Cisco Firewall Services Module (FWSM) Software for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers are affected.

Impact:   A remote user can cause the target device to reload.
Solution:   The vendor has issued a fix (3.2(24.1), 4.1(11.1)).

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm (Links to External Site)
Cause:   Exception handling error, Input validation error, State error

Message History:   None.


 Source Message Contents

Subject:  Cisco Security Advisory: Multiple Vulnerabilities in Cisco Firewall Services Module Software

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Multiple Vulnerabilities in Cisco Firewall
Services Module Software

Advisory ID: cisco-sa-20130410-fwsm

Revision 1.0

For Public Release 2013 April 10 16:00  UTC (GMT)

+----------------------------------------------------------------------

Summary
=======

Cisco Firewall Services Module (FWSM) Software for Cisco Catalyst
6500 Series Switches and Cisco 7600 Series Routers is affected by the
following vulnerabilities:

    FWSM HTTP Proxy Traceback Vulnerability
    IKE Version 1 Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is
affected by one of the vulnerabilities may not be affected by the other.

Successful exploitation of either of these vulnerabilities may result
in a reload of an affected device, leading to a denial of service (DoS)
condition.

Cisco has released free software updates that address these
vulnerabilities. A workaround is available for the IKE vulnerability.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm

Note: The Cisco Adaptive Security Appliance (ASA) may be affected
by some of the vulnerabilities listed above. A separate Cisco
Security Advisory has been published to disclose the vulnerabilities
that affect the Cisco ASA. That advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iF4EAREIAAYFAlFlkSAACgkQUddfH3/BbTo2YwD/c8Pz1w7Af3bIH+OvuwkO7VTL
JmdT2IMDCdZs5rLOH4cA/0EmYvvKa62cD09xfM8u5IgFP+qgWptVYvD15x2uBPWh
=JjgU
-----END PGP SIGNATURE-----
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC