7.9 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:M/Au:N/C:C/I:C/A:C
0.007 Low
EPSS
Percentile
80.0%
The Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500
Series switches and Cisco 7600 Series routers is affected by the following
vulnerabilities:
Syslog Message Memory Corruption Denial of Service
Vulnerability
Authentication Proxy Denial of Service Vulnerability
TACACS+ Authentication Bypass Vulnerability
Sun Remote Procedure Call (SunRPC) Inspection Denial of Service
Vulnerabilities
Internet Locator Server (ILS) Inspection Denial of Service
Vulnerability
These vulnerabilities are not interdependent; a release that is
affected by one vulnerability is not necessarily affected by the others.
Cisco has released software updates that address these vulnerabilities. Workarounds are available for some of the vulnerabilities
disclosed in this advisory.
This advisory is posted at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111005-fwsm[“[[Publication_URL]]”].
Note: Cisco ASA 5500 Series Adaptive Security Appliances and the Cisco
Catalyst 6500 Series ASA Services Module are affected by some of the
vulnerabilities described in this advisory. A separate Cisco Security Advisory
has been published to disclose these and other vulnerabilities that affect the
Cisco ASA 5500 Series Adaptive Security Appliances and the Cisco Catalyst 6500
Series ASA Services Module. The advisory is available at
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111005-asa[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111005-asa”].