Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Firewall)  >   Cisco ASA Vendors:   Cisco
Cisco ASA Bug in DNS Processing Lets Remote Users Cause the Target System to Crash
SecurityTracker Alert ID:  1034156
SecurityTracker URL:
CVE Reference:   CVE-2015-6326   (Links to External Site)
Date:  Nov 14 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco ASA. A remote user can cause the target system to reload.

A remote user can issue a request to the target system and then spoof a specially crafted response to the DNS request packet subsequently issued by the target system to cause the target system to reload.

Systems configured in routed or transparent firewall mode and single or multiple context mode are affected.

Systems with at least one DNS server IP address configured under a DNS server group are affected.

The following devices are affected:

Cisco ASA 1000V Cloud Firewall
Cisco ASA 5500 Series Adaptive Security Appliances
Cisco ASA 5500-X Series Next-Generation Firewalls
Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
Cisco Adaptive Security Virtual Appliance (ASAv)
Cisco FirePOWER 9300 ASA Security Module

The vendor has assigned bug ID CSCuu07799 to this vulnerability.

Impact:   A remote user can cause the target system to reload.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC