SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Cisco ASA Vendors:   Cisco
Cisco ASA Bugs Let Remote Users Execute Arbitrary Commands and Deny Service
SecurityTracker Alert ID:  1032045
SecurityTracker URL:  http://securitytracker.com/id/1032045
CVE Reference:   CVE-2015-0675, CVE-2015-0676, CVE-2015-0677   (Links to External Site)
Updated:  Apr 8 2015
Original Entry Date:  Apr 8 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in Cisco ASA. A remote user can cause denial of service conditions on the target system. A remote user can execute arbitrary commands on the target system.

A remote user on the local network can send specially crafted UDP packets to the target failover device via the failover interface to trigger a flaw in the failover IPSec feature and execute arbitrary configuration commands on the target device [CVE-2015-0675]. This can be exploited to take full control of the active and standby failover units.

The vendor has assigned bug ID CSCur21069 to this vulnerability.

Alec Stuart-Muirk reported this vulnerability.

A remote user can return a specially crafted DNS reply packet to cause the target device to consume all available memory [CVE-2015-0676].

The vendor has assigned bug ID CSCuq77655 to this vulnerability.

A remote user can send a specially crafted XML message to the target device to cause the WebVPN component to crash [CVE-2015-0677]. This may cause all SSL VPN connections to be reset, the system to become unstable, and the system to reload.

Systems configured for Clientless or AnyConnect SSL VPN and AnyConnect IKEv2 VPN are affected.

Systems configured in routed firewall mode and in single context mode are affected.

The vendor has assigned bug ID CSCus95290 to this vulnerability.

Oldrich Valka from AEC reported this vulnerability.

Impact:   A remote user can cause the target device to become unstable or crash.

A remote user on the local network can take full control of the target device.

Solution:   The vendor has issued a fix (7.2(5.16), 8.2(5.57), 8.3(2.44), 8.4(7.28), 8.5(1.24), 8.6(1.17), 8.7(1.16), 9.0(4.33), 9.1(6.1), 9.2(3.4), and 9.3(3)).

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa (Links to External Site)
Cause:   Not specified, Resource error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC