A vulnerability exists in the Cisco Firewall Services Module (FWSM)
for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
that may cause the Cisco FWSM to reload after processing a malformed
Skinny Client Control Protocol (SCCP) message. Devices are affected
when SCCP inspection is enabled.
Cisco has released free software updates that address this
vulnerability.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20110223-fwsm.shtml.
Note: Cisco ASA 5500 Series Adaptive Security Appliances are
affected by the vulnerability described in this advisory. A
separate Cisco Security Advisory has been published to disclose
this and other vulnerabilities that affect the Cisco ASA 5500
Series Adaptive Security Appliances. The advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20110223-asa.shtml.
Affected Products
Vulnerable Products
+------------------
Versions 3.1.x, 3.2.x, 4.0.x, and 4.1.x of Cisco FWSM software are
affected by this vulnerability if SCCP inspection is enabled. SCCP
inspection is enabled by default.
To determine whether SCCP inspection is enabled, issue the "show
service-policy | include skinny" command and confirm that the command
returns output. Example output follows:
fwsm#show service-policy | include skinny
Inspect: skinny , packet 0, drop 0, reset-drop 0
Alternatively, a device that has SCCP inspection enabled has a
configuration similar to the following:
class-map inspection_default
match default-inspection-traffic
!
policy-map global_policy
class inspection_default
...
inspect skinny
...
!
service-policy global_policy global
Note: The service policy could also be applied to a specific
interface. (Global application is shown in the previous example.)
To determine the version of Cisco FWSM software that is running, issue
the "show module" command from Cisco IOS Software or Cisco Catalyst
Operating System Software to identify what modules and submodules are
installed on the system.
The following example shows a system with a Cisco FWSM (WS-SVC-FWM-1)
installed in slot 2:
switch>show module
Mod Ports Card Type Model Serial No.
--- ----- -------------------------------------- ------------------ -----------
1 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC SAL06334NS9
2 6 Firewall Module WS-SVC-FWM-1 SAD10360485
3 8 Intrusion Detection System WS-SVC-IDSM-2 SAD0932089Z
4 4 SLB Application Processor Complex WS-X6066-SLB-APC SAD093004BD
5 2 Supervisor Engine 720 (Active) WS-SUP720-3B SAL0934888E
Mod MAC addresses Hw Fw Sw Status
--- ---------------------------------- ------ ------------ ------------ -------
1 0009.11e3.ade8 to 0009.11e3.adf7 5.1 6.3(1) 8.5(0.46)RFW Ok
2 0018.ba41.5092 to 0018.ba41.5099 4.0 7.2(1) 3.2(2)10 Ok
3 0014.a90c.9956 to 0014.a90c.995d 5.0 7.2(1) 5.1(6)E1 Ok
4 0014.a90c.66e6 to 0014.a90c.66ed 1.7 4.2(3) Ok
5 0013.c42e.7fe0 to 0013.c42e.7fe3 4.4 8.1(3) 12.2(18)SXF1 Ok
[...]
After locating the correct slot, issue the "show module <slot number>"
command to identify the software version that is running, as shown in
the following example:
switch>show module 2
Mod Ports Card Type Model Serial No.
--- ----- -------------------------------------- ------------------ -----------
2 6 Firewall Module WS-SVC-FWM-1 SAD10360485
Mod MAC addresses Hw Fw Sw Status
--- ---------------------------------- ------ ------------ ------------ -------
2 0018.ba41.5092 to 0018.ba41.5099 4.0 7.2(1) 3.2(2)10 Ok
[...]
The preceding example shows that the FWSM is running software version
3.2(2)10 as indicated by the Sw column.
Note: Recent versions of Cisco IOS Software will show the software
version of each module in the output from the "show module" command;
therefore, executing the "show module <slot number>" command is not
necessary.
If a Virtual Switching System (VSS) is used to allow two physical Cisco
Catalyst 6500 Series Switches to operate as a single logical virtual
switch, the "show module switch all" command can display the software
version of all FWSMs that belong to switch 1 and switch 2. The output
from this command will be similar to the output from "show module <slot
number>" but will include module information for the modules in each
switch in the VSS.
Alternatively, version information can be obtained directly from the
FWSM through the "show version" command, as shown in the following
example:
FWSM> show version
FWSM Firewall Version 3.2(2)10
[...]
Customers who use the Cisco Adaptive Security Device Manager (ASDM)
to manage their devices can find the version of the software
displayed in the table in the login window or in the upper left
corner of the ASDM window. The version notation is similar to the
following example:
FWSM Version: 3.2(2)10
Products Confirmed Not Vulnerable
+--------------------------------
With the exception of Cisco ASA 5500 Series Adaptive Security
Appliances, no other Cisco products are currently known to be
affected by this vulnerability.
Details
The Cisco FWSM is a high-speed, integrated firewall module for Cisco
Catalyst 6500 Series Switches and Cisco 7600 Series Routers. The FWSM
offers firewall services with stateful packet filtering and deep
packet inspection.
The Cisco FWSM is affected by a vulnerability that may cause the
device to reload during the processing of a malformed SCCP message
when SCCP inspection is enabled.
This vulnerability is triggered only by transit traffic; traffic that
is destined to the device does not trigger this vulnerability.
This vulnerability is documented in Cisco bug ID CSCtl84952 and has been
assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2011-0394.
Vulnerability Scoring Details
Cisco has provided scores for the vulnerability in this advisory based
on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in
this Security Advisory is done in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at:
Successful exploitation of this vulnerability may cause a reload of
the affected device. Repeated exploitation could result in a
sustained denial of service condition.
Software Versions and Fixes
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to determine
exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
Each row of the following Cisco FWSM software table describes a major
Cisco FWSM software train and the earliest possible release in that
train that contains the fix (the "First Fixed Release") and the
anticipated date of availability (if not currently available) in the
First Fixed Release column. A device that is running a release that
is earlier than the release in a specific column (earlier than the
First Fixed Release) is known to be vulnerable. The release should be
upgraded at least to the indicated release or a later version (later
than or equal to the First Fixed Release label).
Fixed Cisco FWSM software can be downloaded from the Software Center on
Cisco.com by visiting http://www.cisco.com/cisco/software/navigator.html
and navigating to Products > Security > Firewall > Firewall Integrated
Switch/Router Services > Cisco Catalyst 6500 Series Firewall Services
Module > Firewall Services Module (FWSM) Software.
Workarounds
If SCCP inspection is not required, it can be disabled so the device
is no longer affected by the vulnerability. Administrators can
disable SCCP inspection by issuing the "no inspect skinny" command in
class configuration submode in the policy map configuration. If SCCP
inspection is required, there are no workarounds.
Obtaining Fixed Software
Cisco has released free software updates that address this
vulnerability. Prior to deploying software, customers should consult
their maintenance provider or check the software for feature set
compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature
sets they have purchased. By installing, downloading, accessing
or otherwise using such software upgrades, customers agree to be
bound by the terms of Cisco's software license terms found at
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html,
or as otherwise set forth at Cisco.com Downloads at
http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through
their regular update channels. For most customers, this means that
upgrades should be obtained through the Software Center on Cisco's
worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through
prior or existing agreements with third-party support organizations,
such as Cisco Partners, authorized resellers, or service providers
should contact that support organization for guidance and assistance
with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or
fix is the most appropriate for use in the intended network before it
is deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco
service contract, and customers who purchase through third-party
vendors but are unsuccessful in obtaining fixed software through
their point of sale should acquire upgrades by contacting the Cisco
Technical Assistance Center (TAC). TAC contacts are as follows.
+1 800 553 2447 (toll free from within North America)
+1 408 526 7209 (toll call from anywhere in the world)
e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to
a free upgrade. Free upgrades for non-contract customers must be
requested through the TAC.
Refer to
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various
languages.
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory.
This vulnerability was found during internal testing.
Status of this Notice: FINAL
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
This advisory is posted on Cisco's worldwide website at:
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
cust-security-announce@cisco.com
first-bulletins@lists.first.org
bugtraq@securityfocus.com
vulnwatch@vulnwatch.org
cisco@spot.colorado.edu
cisco-nsp@puck.nether.net
full-disclosure@lists.grok.org.uk
comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Complete information on reporting security vulnerabilities
in Cisco products, obtaining assistance with security
incidents, and registering to receive security information
from Cisco, is available on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding
Cisco security notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.
+--------------------------------------------------------------------
Copyright 2010-2011 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
{"id": "SECURITYVULNS:DOC:25812", "bulletinFamily": "software", "title": "Cisco Security Advisory: Cisco Firewall Services Module Skinny Client Control Protocol Inspection Denial of Service Vulnerability", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA256\r\n\r\nCisco Security Advisory: Cisco Firewall Services Module Skinny Client\r\nControl Protocol Inspection Denial of Service Vulnerability\r\n\r\nDocument ID: 112893\r\n\r\nAdvisory ID: cisco-sa-20110223-fwsm\r\n\r\nRevision 1.0\r\n\r\nFor Public Release 2011 February 23 1600 UTC (GMT)\r\n\r\n+---------------------------------------------------------------------\r\n\r\nSummary\r\n=======\r\n\r\nA vulnerability exists in the Cisco Firewall Services Module (FWSM)\r\nfor Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers\r\nthat may cause the Cisco FWSM to reload after processing a malformed\r\nSkinny Client Control Protocol (SCCP) message. Devices are affected\r\nwhen SCCP inspection is enabled.\r\n\r\nCisco has released free software updates that address this\r\nvulnerability.\r\n\r\nThis advisory is posted at\r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20110223-fwsm.shtml.\r\n\r\nNote: Cisco ASA 5500 Series Adaptive Security Appliances are\r\naffected by the vulnerability described in this advisory. A\r\nseparate Cisco Security Advisory has been published to disclose\r\nthis and other vulnerabilities that affect the Cisco ASA 5500\r\nSeries Adaptive Security Appliances. The advisory is available at\r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20110223-asa.shtml.\r\n\r\nAffected Products\r\n=================\r\n\r\nVulnerable Products\r\n+------------------\r\n\r\nVersions 3.1.x, 3.2.x, 4.0.x, and 4.1.x of Cisco FWSM software are\r\naffected by this vulnerability if SCCP inspection is enabled. SCCP\r\ninspection is enabled by default.\r\n\r\nTo determine whether SCCP inspection is enabled, issue the "show\r\nservice-policy | include skinny" command and confirm that the command\r\nreturns output. Example output follows:\r\n\r\n fwsm#show service-policy | include skinny\r\n Inspect: skinny , packet 0, drop 0, reset-drop 0\r\n\r\nAlternatively, a device that has SCCP inspection enabled has a\r\nconfiguration similar to the following:\r\n\r\n class-map inspection_default\r\n match default-inspection-traffic\r\n !\r\n policy-map global_policy\r\n class inspection_default\r\n ...\r\n inspect skinny\r\n ...\r\n !\r\n service-policy global_policy global\r\n\r\nNote: The service policy could also be applied to a specific\r\ninterface. (Global application is shown in the previous example.)\r\n\r\nTo determine the version of Cisco FWSM software that is running, issue\r\nthe "show module" command from Cisco IOS Software or Cisco Catalyst\r\nOperating System Software to identify what modules and submodules are\r\ninstalled on the system.\r\n\r\nThe following example shows a system with a Cisco FWSM (WS-SVC-FWM-1)\r\ninstalled in slot 2:\r\n\r\n switch>show module\r\n Mod Ports Card Type Model Serial No.\r\n --- ----- -------------------------------------- ------------------ -----------\r\n 1 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC SAL06334NS9\r\n 2 6 Firewall Module WS-SVC-FWM-1 SAD10360485\r\n 3 8 Intrusion Detection System WS-SVC-IDSM-2 SAD0932089Z\r\n 4 4 SLB Application Processor Complex WS-X6066-SLB-APC SAD093004BD\r\n 5 2 Supervisor Engine 720 (Active) WS-SUP720-3B SAL0934888E\r\n\r\n Mod MAC addresses Hw Fw Sw Status\r\n --- ---------------------------------- ------ ------------ ------------ -------\r\n 1 0009.11e3.ade8 to 0009.11e3.adf7 5.1 6.3(1) 8.5(0.46)RFW Ok\r\n 2 0018.ba41.5092 to 0018.ba41.5099 4.0 7.2(1) 3.2(2)10 Ok\r\n 3 0014.a90c.9956 to 0014.a90c.995d 5.0 7.2(1) 5.1(6)E1 Ok\r\n 4 0014.a90c.66e6 to 0014.a90c.66ed 1.7 4.2(3) Ok\r\n 5 0013.c42e.7fe0 to 0013.c42e.7fe3 4.4 8.1(3) 12.2(18)SXF1 Ok\r\n\r\n [...]\r\n\r\nAfter locating the correct slot, issue the "show module <slot number>"\r\ncommand to identify the software version that is running, as shown in\r\nthe following example:\r\n\r\n switch>show module 2\r\n Mod Ports Card Type Model Serial No.\r\n --- ----- -------------------------------------- ------------------ -----------\r\n 2 6 Firewall Module WS-SVC-FWM-1 SAD10360485\r\n\r\n Mod MAC addresses Hw Fw Sw Status\r\n --- ---------------------------------- ------ ------------ ------------ -------\r\n 2 0018.ba41.5092 to 0018.ba41.5099 4.0 7.2(1) 3.2(2)10 Ok\r\n\r\n [...]\r\n\r\nThe preceding example shows that the FWSM is running software version\r\n3.2(2)10 as indicated by the Sw column.\r\n\r\nNote: Recent versions of Cisco IOS Software will show the software\r\nversion of each module in the output from the "show module" command;\r\ntherefore, executing the "show module <slot number>" command is not\r\nnecessary.\r\n\r\nIf a Virtual Switching System (VSS) is used to allow two physical Cisco\r\nCatalyst 6500 Series Switches to operate as a single logical virtual\r\nswitch, the "show module switch all" command can display the software\r\nversion of all FWSMs that belong to switch 1 and switch 2. The output\r\nfrom this command will be similar to the output from "show module <slot\r\nnumber>" but will include module information for the modules in each\r\nswitch in the VSS.\r\n\r\nAlternatively, version information can be obtained directly from the\r\nFWSM through the "show version" command, as shown in the following\r\nexample:\r\n\r\n FWSM> show version\r\n FWSM Firewall Version 3.2(2)10\r\n [...]\r\n\r\nCustomers who use the Cisco Adaptive Security Device Manager (ASDM)\r\nto manage their devices can find the version of the software\r\ndisplayed in the table in the login window or in the upper left\r\ncorner of the ASDM window. The version notation is similar to the\r\nfollowing example:\r\n\r\n FWSM Version: 3.2(2)10\r\n\r\nProducts Confirmed Not Vulnerable\r\n+--------------------------------\r\n\r\nWith the exception of Cisco ASA 5500 Series Adaptive Security\r\nAppliances, no other Cisco products are currently known to be\r\naffected by this vulnerability.\r\n\r\nDetails\r\n=======\r\n\r\nThe Cisco FWSM is a high-speed, integrated firewall module for Cisco\r\nCatalyst 6500 Series Switches and Cisco 7600 Series Routers. The FWSM\r\noffers firewall services with stateful packet filtering and deep\r\npacket inspection.\r\n\r\nThe Cisco FWSM is affected by a vulnerability that may cause the\r\ndevice to reload during the processing of a malformed SCCP message\r\nwhen SCCP inspection is enabled.\r\n\r\nThis vulnerability is triggered only by transit traffic; traffic that\r\nis destined to the device does not trigger this vulnerability.\r\n\r\nThis vulnerability is documented in Cisco bug ID CSCtl84952 and has been\r\nassigned Common Vulnerabilities and Exposures (CVE) ID CVE-2011-0394.\r\n\r\nVulnerability Scoring Details\r\n=============================\r\n\r\nCisco has provided scores for the vulnerability in this advisory based\r\non the Common Vulnerability Scoring System (CVSS). The CVSS scoring in\r\nthis Security Advisory is done in accordance with CVSS version 2.0.\r\n\r\nCVSS is a standards-based scoring method that conveys vulnerability\r\nseverity and helps determine urgency and priority of response.\r\n\r\nCisco has provided a base and temporal score. Customers can then\r\ncompute environmental scores to assist in determining the impact of\r\nthe vulnerability in individual networks.\r\n\r\nCisco has provided an FAQ to answer additional questions regarding\r\nCVSS at:\r\n\r\nhttp://www.cisco.com/web/about/security/intelligence/cvss-qandas.html\r\n\r\nCisco has also provided a CVSS calculator to help compute the\r\nenvironmental impact for individual networks at:\r\n\r\nhttp://intellishield.cisco.com/security/alertmanager/cvss\r\n\r\n* CSCtl84952 ("SCCP inspection DoS vulnerability")\r\n\r\nCVSS Base Score - 7.8\r\n Access Vector - Network\r\n Access Complexity - Low\r\n Authentication - None\r\n Confidentiality Impact - None\r\n Integrity Impact - None\r\n Availability Impact - Complete\r\n\r\nCVSS Temporal Score - 6.4\r\n Exploitability - Functional\r\n Remediation Level - Official-Fix\r\n Report Confidence - Confirmed\r\n\r\n\r\nImpact\r\n======\r\n\r\nSuccessful exploitation of this vulnerability may cause a reload of\r\nthe affected device. Repeated exploitation could result in a\r\nsustained denial of service condition.\r\n\r\nSoftware Versions and Fixes\r\n===========================\r\n\r\nWhen considering software upgrades, also consult\r\nhttp://www.cisco.com/go/psirt and any subsequent advisories to determine\r\nexposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should exercise caution to be certain the\r\ndevices to be upgraded contain sufficient memory and that current\r\nhardware and software configurations will continue to be supported\r\nproperly by the new release. If the information is not clear, contact\r\nthe Cisco Technical Assistance Center (TAC) or your contracted\r\nmaintenance provider for assistance.\r\n\r\nEach row of the following Cisco FWSM software table describes a major\r\nCisco FWSM software train and the earliest possible release in that\r\ntrain that contains the fix (the "First Fixed Release") and the\r\nanticipated date of availability (if not currently available) in the\r\nFirst Fixed Release column. A device that is running a release that\r\nis earlier than the release in a specific column (earlier than the\r\nFirst Fixed Release) is known to be vulnerable. The release should be\r\nupgraded at least to the indicated release or a later version (later\r\nthan or equal to the First Fixed Release label).\r\n\r\n+------------------------------------------------------------+\r\n| Major Release | First Fixed Release |\r\n|------------------------+-----------------------------------|\r\n| 3.1 | 3.1(20) |\r\n|------------------------+-----------------------------------|\r\n| 3.2 | 3.2(20) |\r\n|------------------------+-----------------------------------|\r\n| 4.0 | 4.0(15) |\r\n|------------------------+-----------------------------------|\r\n| 4.1 | 4.1(5) |\r\n+------------------------------------------------------------+\r\n\r\nFixed Cisco FWSM software can be downloaded from the Software Center on\r\nCisco.com by visiting http://www.cisco.com/cisco/software/navigator.html\r\nand navigating to Products > Security > Firewall > Firewall Integrated\r\nSwitch/Router Services > Cisco Catalyst 6500 Series Firewall Services\r\nModule > Firewall Services Module (FWSM) Software.\r\n\r\nWorkarounds\r\n===========\r\n\r\nIf SCCP inspection is not required, it can be disabled so the device\r\nis no longer affected by the vulnerability. Administrators can\r\ndisable SCCP inspection by issuing the "no inspect skinny" command in\r\nclass configuration submode in the policy map configuration. If SCCP\r\ninspection is required, there are no workarounds.\r\n\r\nObtaining Fixed Software\r\n========================\r\n\r\nCisco has released free software updates that address this\r\nvulnerability. Prior to deploying software, customers should consult\r\ntheir maintenance provider or check the software for feature set\r\ncompatibility and known issues specific to their environment.\r\n\r\nCustomers may only install and expect support for the feature\r\nsets they have purchased. By installing, downloading, accessing\r\nor otherwise using such software upgrades, customers agree to be\r\nbound by the terms of Cisco's software license terms found at\r\nhttp://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html,\r\nor as otherwise set forth at Cisco.com Downloads at\r\nhttp://www.cisco.com/public/sw-center/sw-usingswc.shtml.\r\n\r\nDo not contact psirt@cisco.com or security-alert@cisco.com for\r\nsoftware upgrades.\r\n\r\nCustomers with Service Contracts\r\n+-------------------------------\r\n\r\nCustomers with contracts should obtain upgraded software through\r\ntheir regular update channels. For most customers, this means that\r\nupgrades should be obtained through the Software Center on Cisco's\r\nworldwide website at http://www.cisco.com.\r\n\r\nCustomers using Third Party Support Organizations\r\n+------------------------------------------------\r\n\r\nCustomers whose Cisco products are provided or maintained through\r\nprior or existing agreements with third-party support organizations,\r\nsuch as Cisco Partners, authorized resellers, or service providers\r\nshould contact that support organization for guidance and assistance\r\nwith the appropriate course of action in regards to this advisory.\r\n\r\nThe effectiveness of any workaround or fix is dependent on specific\r\ncustomer situations, such as product mix, network topology, traffic\r\nbehavior, and organizational mission. Due to the variety of affected\r\nproducts and releases, customers should consult with their service\r\nprovider or support organization to ensure any applied workaround or\r\nfix is the most appropriate for use in the intended network before it\r\nis deployed.\r\n\r\nCustomers without Service Contracts\r\n+----------------------------------\r\n\r\nCustomers who purchase direct from Cisco but do not hold a Cisco\r\nservice contract, and customers who purchase through third-party\r\nvendors but are unsuccessful in obtaining fixed software through\r\ntheir point of sale should acquire upgrades by contacting the Cisco\r\nTechnical Assistance Center (TAC). TAC contacts are as follows.\r\n\r\n * +1 800 553 2447 (toll free from within North America)\r\n * +1 408 526 7209 (toll call from anywhere in the world)\r\n * e-mail: tac@cisco.com\r\n\r\nCustomers should have their product serial number available and be\r\nprepared to give the URL of this notice as evidence of entitlement to\r\na free upgrade. Free upgrades for non-contract customers must be\r\nrequested through the TAC.\r\n\r\nRefer to\r\nhttp://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html\r\nfor additional TAC contact information, including localized telephone\r\nnumbers, and instructions and e-mail addresses for use in various\r\nlanguages.\r\n\r\nExploitation and Public Announcements\r\n=====================================\r\n\r\nThe Cisco PSIRT is not aware of any public announcements or malicious\r\nuse of the vulnerability described in this advisory.\r\n\r\nThis vulnerability was found during internal testing.\r\n\r\nStatus of this Notice: FINAL\r\n============================\r\n\r\nTHIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY\r\nKIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF\r\nMERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE\r\nINFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS\r\nAT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS\r\nDOCUMENT AT ANY TIME.\r\n\r\nA stand-alone copy or Paraphrase of the text of this document that\r\nomits the distribution URL in the following section is an\r\nuncontrolled copy, and may lack important information or contain\r\nfactual errors.\r\n\r\nDistribution\r\n============\r\n\r\nThis advisory is posted on Cisco's worldwide website at:\r\n\r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20110223-fwsm.shtml\r\n\r\nIn addition to worldwide web posting, a text version of this notice\r\nis clear-signed with the Cisco PSIRT PGP key and is posted to the\r\nfollowing e-mail and Usenet news recipients.\r\n\r\n * cust-security-announce@cisco.com\r\n * first-bulletins@lists.first.org\r\n * bugtraq@securityfocus.com\r\n * vulnwatch@vulnwatch.org\r\n * cisco@spot.colorado.edu\r\n * cisco-nsp@puck.nether.net\r\n * full-disclosure@lists.grok.org.uk\r\n * comp.dcom.sys.cisco@newsgate.cisco.com\r\n\r\nFuture updates of this advisory, if any, will be placed on Cisco's\r\nworldwide website, but may or may not be actively announced on\r\nmailing lists or newsgroups. Users concerned about this problem are\r\nencouraged to check the above URL for any updates.\r\n\r\nRevision History\r\n================\r\n\r\n+------------------------------------------------------------+\r\n| Revision 1.0 | 2011-February-23 | Initial public release. |\r\n+------------------------------------------------------------+\r\n\r\nCisco Security Procedures\r\n=========================\r\n\r\nComplete information on reporting security vulnerabilities\r\nin Cisco products, obtaining assistance with security\r\nincidents, and registering to receive security information\r\nfrom Cisco, is available on Cisco's worldwide website at\r\nhttp://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.\r\nThis includes instructions for press inquiries regarding\r\nCisco security notices. All Cisco security advisories are available at\r\nhttp://www.cisco.com/go/psirt.\r\n\r\n+--------------------------------------------------------------------\r\nCopyright 2010-2011 Cisco Systems, Inc. All rights reserved.\r\n+--------------------------------------------------------------------\r\n\r\nUpdated: Feb 23, 2011 Document ID: 112893\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.10 (GNU/Linux)\r\n\r\niF4EAREIAAYFAk1lNIEACgkQQXnnBKKRMNBMnwD/c2TAVA9KZuoSquSH8snXRjde\r\nT2LTwk0JlEx/+xfOpp0A/RNL3+1KwCgpSXSXz3m3xp/qgWTMWV2UXdK5Pw/6AND/\r\n=bHUt\r\n-----END PGP SIGNATURE-----", "published": "2011-02-28T00:00:00", "modified": "2011-02-28T00:00:00", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25812", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2011-0394"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:39", "edition": 1, "viewCount": 4, "enchantments": {"score": {"value": 7.5, "vector": "NONE", "modified": "2018-08-31T11:10:39", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-0394"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11470", "SECURITYVULNS:DOC:25811"]}, {"type": "nessus", "idList": ["CISCO-SA-20110223-ASA.NASL"]}, {"type": "cisco", "idList": ["CISCO-SA-20110223-ASA"]}], "modified": "2018-08-31T11:10:39", "rev": 2}, "vulnersScore": 7.5}, "affectedSoftware": []}
{"cve": [{"lastseen": "2021-02-02T05:50:58", "description": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952.", "edition": 6, "cvss3": {}, "published": "2011-02-25T12:00:00", "title": "CVE-2011-0394", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-0394"], "modified": "2017-08-17T01:33:00", "cpe": ["cpe:/a:cisco:adaptive_security_appliance_software:7.0.8", "cpe:/o:cisco:firewall_services_module_software:4.1\\(3\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.0\\(4\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.0.2", "cpe:/o:cisco:firewall_services_module_software:3.1\\(18\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.2\\(3.9\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.18\\)", "cpe:/o:cisco:firewall_services_module_software:3.2\\(1\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.1.2", "cpe:/o:cisco:firewall_services_module_software:4.0\\(7\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.2\\(3\\)", "cpe:/o:cisco:firewall_services_module_software:3.1\\(5\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.8\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.0\\(5\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.0.7", "cpe:/o:cisco:firewall_services_module_software:4.0\\(8\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.15\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.1\\(2.48\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.0\\(0\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.5\\)", "cpe:/o:cisco:firewall_services_module_software:4.0\\(4\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.1", "cpe:/a:cisco:adaptive_security_appliance_software:7.0.4.3", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.10\\)", "cpe:/h:cisco:firewall_services_module:*", "cpe:/a:cisco:adaptive_security_appliance_software:7.1\\(5\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.0.5", "cpe:/a:cisco:adaptive_security_appliance_software:7.0\\(6.7\\)", "cpe:/h:cisco:pix_500:*", "cpe:/a:cisco:adaptive_security_appliance_software:7.0.1.4", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.16\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.0", "cpe:/a:cisco:adaptive_security_appliance_software:7.2", "cpe:/o:cisco:firewall_services_module_software:3.2\\(3\\)", "cpe:/o:cisco:firewall_services_module_software:3.2\\(14\\)", "cpe:/o:cisco:firewall_services_module_software:3.2", "cpe:/o:cisco:firewall_services_module_software:4.0\\(11\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.3\\(1\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.2.1", "cpe:/a:cisco:adaptive_security_appliance_software:7.0\\(5.2\\)", "cpe:/o:cisco:firewall_services_module_software:4.0", "cpe:/a:cisco:adaptive_security_appliance_software:8.0.5", "cpe:/a:cisco:adaptive_security_appliance_software:8.0.2", "cpe:/a:cisco:adaptive_security_appliance_software:7.2.5", "cpe:/o:cisco:firewall_services_module_software:3.1\\(6\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.0.6", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(1.22\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.2\\(4\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.0.3", "cpe:/a:cisco:adaptive_security_appliance_software:7.2.2", "cpe:/h:cisco:asa_5500:*", "cpe:/o:cisco:firewall_services_module_software:4.0\\(6\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.19\\)", "cpe:/o:cisco:firewall_services_module_software:4.0\\(13\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.1\\(2.27\\)", "cpe:/o:cisco:firewall_services_module_software:4.1\\(1\\)", "cpe:/o:cisco:firewall_services_module_software:4.1", "cpe:/a:cisco:adaptive_security_appliance_software:7.0", "cpe:/o:cisco:firewall_services_module_software:3.1\\(16\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.1\\(2\\)", "cpe:/o:cisco:firewall_services_module_software:4.0\\(10\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2.1", "cpe:/a:cisco:adaptive_security_appliance_software:7.0\\(2\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.2\\(2\\)", "cpe:/o:cisco:firewall_services_module_software:3.2\\(13\\)", "cpe:/o:cisco:firewall_services_module_software:4.0\\(14\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.0.4", "cpe:/a:cisco:adaptive_security_appliance_software:7.0.1", "cpe:/o:cisco:firewall_services_module_software:3.2\\(2\\)", "cpe:/o:cisco:adaptive_security_appliance:8.1\\(1\\)", "cpe:/a:cisco:adaptive_security_appliance_software:8.2\\(1\\)", "cpe:/o:cisco:firewall_services_module_software:4.1\\(4\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.1\\(2.5\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.17\\)", "cpe:/o:cisco:firewall_services_module_software:3.1\\(17\\)", "cpe:/o:cisco:firewall_services_module_software:4.0\\(12\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.1\\(2.49\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.7\\)", "cpe:/o:cisco:firewall_services_module_software:3.1\\(19\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.14\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(1\\)", "cpe:/h:cisco:5500_series_adaptive_security_appliance:*", "cpe:/a:cisco:adaptive_security_appliance_software:7.0.4", "cpe:/a:cisco:adaptive_security_appliance_software:8.2.2", "cpe:/a:cisco:adaptive_security_appliance_software:7.2.4", "cpe:/o:cisco:firewall_services_module_software:3.1", "cpe:/o:cisco:adaptive_security_appliance:8.1\\(2\\)", "cpe:/o:cisco:firewall_services_module_software:3.2\\(16\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2.3", "cpe:/a:cisco:adaptive_security_appliance_software:7.1.1", "cpe:/o:cisco:firewall_services_module_software:4.1\\(2\\)", "cpe:/a:cisco:adaptive_security_appliance_software:7.2\\(2.48\\)"], "id": "CVE-2011-0394", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0394", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.18\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.49\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.48\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.16\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.14\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.27\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.15\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.48\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.19\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.10\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(5.2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.1\\(2.5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.17\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2.7\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(1.22\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0\\(6.7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:adaptive_security_appliance_software:7.2\\(2\\):*:*:*:*:*:*:*"]}], "securityvulns": [{"lastseen": "2018-08-31T11:09:41", "bulletinFamily": "software", "cvelist": ["CVE-2011-0393", "CVE-2011-0394"], "description": "SCCP DoS, packets flood DoS.", "edition": 1, "modified": "2011-02-28T00:00:00", "published": "2011-02-28T00:00:00", "id": "SECURITYVULNS:VULN:11470", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11470", "title": "Cisco FWSM / ASA DoS", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:39", "bulletinFamily": "software", "cvelist": ["CVE-2011-0395", "CVE-2011-0393", "CVE-2011-0396", "CVE-2011-0394"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA256\r\n\r\nCisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500\r\nSeries Adaptive Security Appliances\r\n\r\nAdvisory ID: cisco-sa-20110223-asa\r\n\r\nRevision 1.0\r\n\r\nFor Public Release 2011 February 23 1600 UTC (GMT)\r\n\r\n+---------------------------------------------------------------------\r\n\r\nSummary\r\n=======\r\n\r\nCisco ASA 5500 Series Adaptive Security Appliances are affected by the\r\nfollowing vulnerabilities:\r\n\r\n * Transparent Firewall Packet Buffer Exhaustion Vulnerability\r\n * Skinny Client Control Protocol (SCCP) Inspection Denial of\r\n Service Vulnerability\r\n * Routing Information Protocol (RIP) Denial of Service\r\n Vulnerability\r\n * Unauthorized File System Access Vulnerability\r\n\r\nThese vulnerabilities are independent; a release that is affected by\r\none vulnerability is not necessarily affected by the others.\r\n\r\nCisco has released free software updates that address these\r\nvulnerabilities.\r\n\r\nThis advisory is posted at\r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20110223-asa.shtml.\r\n\r\nNote: The Cisco Firewall Services Module (FWSM) is affected\r\nby one of these vulnerabilities. A separate Cisco Security\r\nAdvisory has been published to disclose the vulnerability\r\nthat affects the Cisco FWSM. That advisory is available at\r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20110223-fwsm.shtml.\r\n\r\nAffected Products\r\n=================\r\n\r\nCisco ASA 5500 Series Adaptive Security Appliances are affected by\r\nmultiple vulnerabilities. Affected versions of Cisco ASA Software\r\nvary depending on the specific vulnerability.\r\n\r\nVulnerable Products\r\n+------------------\r\n\r\nFor specific version information, refer to the Software Versions and\r\nFixes section of this advisory.\r\n\r\nTransparent Firewall Packet Buffer Exhaustion Vulnerability\r\n+----------------------------------------------------------\r\n\r\nA packet buffer exhaustion vulnerability affects multiple versions of\r\nCisco ASA Software when a security appliance is configured to operate in\r\nthe transparent firewall mode. Transparent firewall mode is enabled on\r\nthe appliance if the command "firewall transparent" is present in the\r\nconfiguration. The default firewall mode is routed, not transparent.\r\nThe "show firewall" command can also be used to determine the firewall\r\noperation mode:\r\n\r\n ciscoasa# show firewall\r\n Firewall mode: Transparent\r\n\r\nSCCP Inspection Denial of Service Vulnerability\r\n+----------------------------------------------\r\n\r\nA denial of service vulnerability affects the SCCP inspection feature\r\nof Cisco ASA 5500 Series Adaptive Security Appliances.\r\n\r\nAdministrators can determine if SCCP inspection is enabled by issuing\r\nthe "show service-policy | include skinny" command and confirming that\r\noutput, such as what is displayed in the following example, is returned.\r\n\r\n ciscoasa# show service-policy | include skinny\r\n Inspect: skinny, packet 0, drop 0, reset-drop 0\r\n\r\nAlternatively, a device that has SCCP inspection enabled has a\r\nconfiguration similar to the following:\r\n\r\n class-map inspection_default\r\n match default-inspection-traffic\r\n\r\n !\r\n\r\n policy-map global_policy\r\n class inspection_default\r\n ...\r\n inspect skinny\r\n ...\r\n\r\n !\r\n\r\n service-policy global_policy global\r\n\r\nNote: The service policy could also be applied to a specific\r\ninterface instead of globally, which is displayed in the previous\r\nexample.\r\n\r\nSCCP inspection is enabled by default.\r\n\r\nRIP Denial of Service Vulnerability\r\n+----------------------------------\r\n\r\nA denial of service vulnerability affects the RIP implementation in\r\nCisco ASA 5500 Series Adaptive Security Appliances when both RIP and\r\nthe Cisco Phone Proxy feature are enabled on the same device. The\r\nfollowing example displays an affected configuration (Cisco ASA\r\nSoftware version 8.0 and 8.1):\r\n\r\n router rip\r\n ...\r\n\r\n !\r\n\r\n phone-proxy <instance name>\r\n media-termination address <IP address>\r\n ...\r\n <Rest of phone proxy feature configuration>\r\n\r\nOr (Cisco ASA Software version 8.2 and later):\r\n\r\n router rip\r\n ...\r\n\r\n !\r\n\r\n media-termination <instance name>\r\n address <IP address>\r\n\r\n !\r\n\r\n <Rest of phone proxy feature configuration>\r\n\r\nA security appliance is vulnerable if it is processing RIP messages\r\n("router rip") and if a global media termination address is configured\r\nfor the Cisco Phone Proxy feature (refer to previous example). Note\r\nthat Cisco ASA Software versions 8.0 and 8.1 only allow a global\r\nmedia termination address. However, in Cisco ASA Software version 8.2\r\nand later, it is possible to tie a media termination address to an\r\ninterface. This configuration, which is accomplished by issuing the\r\ncommand "address <IP address> interface <interface name>" in media\r\ntermination configuration mode, is not affected.\r\n\r\nNeither RIP nor the Cisco Phone Proxy feature is enabled by default.\r\n\r\nUnauthorized File System Access Vulnerability\r\n+--------------------------------------------\r\n\r\nAn unauthorized file system access vulnerability affects Cisco ASA\r\n5500 Series Adaptive Security Appliances when a security appliance is\r\nconfigured as a local Certificate Authority (CA). An affected\r\nconfiguration consists of the following minimum commands:\r\n\r\n crypto ca trustpoint <trustpoint name>\r\n keypair <keypair name>\r\n crl configure\r\n crypto ca server\r\n crypto ca certificate chain <trustpoint name>\r\n certificate ca 01\r\n ...\r\n\r\n !\r\n\r\n http server enable\r\n\r\nThe local CA server is not enabled by default.\r\n\r\nCisco PIX 500 Series Security Appliance Vulnerability Status\r\n+-----------------------------------------------------------\r\n\r\nCisco PIX 500 Series Security Appliances are affected by the\r\nTransparent Firewall Packet Buffer Exhaustion Vulnerability and the\r\nSCCP Inspection Denial of Service Vulnerability.\r\n\r\nBecause Cisco PIX 500 Series Security Appliances reached the end\r\nof software maintenance releases milestone on July 28, 2009,\r\nno further software releases will be available. Cisco PIX 500\r\nSeries Security Appliance customers are encouraged to migrate\r\nto Cisco ASA 5500 Series Adaptive Security Appliances or to\r\nimplement any applicable workarounds that are listed in the\r\nWorkarounds section of this advisory. Fixed software is available\r\nfor Cisco ASA 5500 Series Adaptive Security Appliances only.\r\nFor more information, refer to the End of Life announcement at\r\nhttp://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5709/ps2030/end_of_life_notice_cisco_pix_525_sec_app.html.\r\n\r\nHow to Determine Software Versions\r\n+---------------------------------\r\n\r\nTo determine whether a vulnerable version of Cisco ASA Software is\r\nrunning on an appliance, administrators can issue the "show version"\r\ncommand. The following example shows a Cisco ASA 5500 Series Adaptive\r\nSecurity Appliance that is running software version 8.3(1):\r\n\r\n ASA#show version | include Version\r\n Cisco Adaptive Security Appliance Software Version 8.3(1)\r\n Device Manager Version 6.3(1)\r\n\r\nCustomers who use Cisco Adaptive Security Device Manager (ASDM) to\r\nmanage devices can locate the software version in the table that is\r\ndisplayed in the login window or upper-left corner of the Cisco ASDM\r\nwindow.\r\n\r\nProducts Confirmed Not Vulnerable\r\n+--------------------------------\r\n\r\nWith the exception of Cisco PIX 500 Series Security Appliances and\r\nthe Cisco Firewall Services Module, no other Cisco products are\r\ncurrently known to be affected by these vulnerabilities.\r\n\r\nDetails\r\n=======\r\n\r\nThe Cisco ASA 5500 Series Adaptive Security Appliance is a modular\r\nplatform that provides security and VPN services. It offers firewall,\r\nintrusion prevention system (IPS), anti-X, and virtual private\r\nnetwork (VPN) services.\r\n\r\nCisco ASA 5500 Series Adaptive Security Appliances are affected by\r\nthe following vulnerabilities:\r\n\r\nTransparent Firewall Packet Buffer Exhaustion Vulnerability\r\n+----------------------------------------------------------\r\n\r\nA Cisco ASA 5500 Series Adaptive Security Appliance that is\r\nconfigured for transparent firewall mode is affected by a packet\r\nbuffer exhaustion vulnerability that could cause an appliance to stop\r\nforwarding traffic once all packet buffers are depleted. The number\r\nof available packet buffers may decrease when a security appliance\r\nreceives IPv6 traffic and is not configured for IPv6 operation. IPv6\r\ntransit traffic does not cause a problem.\r\n\r\nAdministrators can check packet buffer utilization by issuing the\r\ncommand "show blocks" and inspecting the output for the number of\r\navailable 1,550-byte blocks. If the number of blocks is zero (indicated\r\nby 0 in the CNT column), then the security appliance may be experiencing\r\nthis issue. For example:\r\n\r\n ciscoasa# show blocks\r\n SIZE MAX LOW CNT\r\n 0 400 360 400\r\n 4 200 199 199\r\n 80 400 358 400\r\n 256 1412 1381 1412\r\n 1550 6274 0 0\r\n ...\r\n\r\nThis vulnerability is documented in Cisco bug ID CSCtj04707 and has been\r\nassigned Common Vulnerabilities and Exposures (CVE) ID CVE-2011-0393.\r\n\r\nSCCP Inspection Denial of Service Vulnerability\r\n+----------------------------------------------\r\n\r\nCisco ASA 5500 Series Adaptive Security Appliances are affected by a\r\nvulnerability that could cause the appliance to reload when it\r\nprocesses a malformed SCCP message. Appliances are only vulnerable if\r\nSCCP inspection is enabled.\r\n\r\nOnly transit traffic can trigger this vulnerability; traffic that is\r\ndestined to the appliance will not trigger the vulnerability.\r\n\r\nThis vulnerability is documented in Cisco bug ID CSCtg69457 and has been\r\nassigned Common Vulnerabilities and Exposures (CVE) ID CVE-2011-0394.\r\n\r\nRIP Denial of Service Vulnerability\r\n+----------------------------------\r\n\r\nCisco ASA 5500 Series Adaptive Security Appliances are affected by a\r\nvulnerability that could cause the appliance to reload when it\r\nprocesses valid RIP updates. Appliances are vulnerable only if both\r\nRIP and the Cisco Phone Proxy feature are enabled.\r\n\r\nNote: the affected configuration requires that a global media\r\ntermination address is configured, which is the only possible\r\nconfiguration option in Cisco ASA Software versions 8.0 and 8.1.\r\nHowever, it is possible to tie a media termination address to an\r\ninterface in Cisco ASA Software version 8.2 and later. This\r\nconfiguration is not vulnerable.\r\n\r\nThis vulnerability is documented in Cisco bug ID CSCtg66583 and has been\r\nassigned Common Vulnerabilities and Exposures (CVE) ID CVE-2011-0395.\r\n\r\nUnauthorized File System Access Vulnerability\r\n+--------------------------------------------\r\n\r\nCisco ASA 5500 Series Adaptive Security Appliances are affected by a\r\nvulnerability that could allow unauthorized users to access a file\r\nsystem (flash:, disk0:, disk1:, etc. but not system:) when the\r\nsecurity appliance is configured as a local CA server. No\r\nauthentication is required. File systems could contain sensitive\r\ninformation, such as backup device configurations (which may contain\r\npasswords or shared secrets), Cisco ASA Software images, or digital\r\ncertificates.\r\n\r\nThis vulnerability is documented in Cisco bug ID CSCtk12352 and has been\r\nassigned Common Vulnerabilities and Exposures (CVE) ID CVE-2011-0396.\r\n\r\nVulnerability Scoring Details\r\n=============================\r\n\r\nCisco has provided scores for the vulnerabilities in this advisory\r\nbased on the Common Vulnerability Scoring System (CVSS). The CVSS\r\nscoring in this Security Advisory is done in accordance with CVSS\r\nversion 2.0.\r\n\r\nCVSS is a standards-based scoring method that conveys vulnerability\r\nseverity and helps determine urgency and priority of response.\r\n\r\nCisco has provided a base and temporal score. Customers can then\r\ncompute environmental scores to assist in determining the impact of\r\nthe vulnerability in individual networks.\r\n\r\nCisco has provided an FAQ to answer additional questions regarding\r\nCVSS at:\r\n\r\nhttp://www.cisco.com/web/about/security/intelligence/cvss-qandas.html\r\n\r\nCisco has also provided a CVSS calculator to help compute the\r\nenvironmental impact for individual networks at:\r\n\r\nhttp://intellishield.cisco.com/security/alertmanager/cvss\r\n\r\n* CSCtj04707 ("Possible packet buffer exhaustion when operating in transparent mode ")\r\n\r\nCVSS Base Score - 7.8\r\n Access Vector - Network\r\n Access Complexity - Low\r\n Authentication - None\r\n Confidentiality Impact - None\r\n Integrity Impact - None\r\n Availability Impact - Complete\r\n\r\nCVSS Temporal Score - 6.4\r\n Exploitability - Functional\r\n Remediation Level - Official-Fix\r\n Report Confidence - Confirmed\r\n\r\n* CSCtg69457 ("SCCP inspection DoS vulnerability")\r\n\r\nCVSS Base Score - 7.8\r\n Access Vector - Network\r\n Access Complexity - Low\r\n Authentication - None\r\n Confidentiality Impact - None\r\n Integrity Impact - None\r\n Availability Impact - Complete\r\n\r\nCVSS Temporal Score - 6.4\r\n Exploitability - Functional\r\n Remediation Level - Official-Fix\r\n Report Confidence - Confirmed\r\n\r\n* CSCtg66583 ("RIP denial of service vulnerability")\r\n\r\nCVSS Base Score - 7.8\r\n Access Vector - Network\r\n Access Complexity - Low\r\n Authentication - None\r\n Confidentiality Impact - None\r\n Integrity Impact - None\r\n Availability Impact - Complete\r\n\r\nCVSS Temporal Score - 6.4\r\n Exploitability - Functional\r\n Remediation Level - Official-Fix\r\n Report Confidence - Confirmed\r\n\r\n* CSCtk12352 ("Possible to browse flash memory when CA is enabled")\r\n\r\nCVSS Base Score - 7.8\r\n Access Vector - Network\r\n Access Complexity - Low\r\n Authentication - None\r\n Confidentiality Impact - Complete\r\n Integrity Impact - None\r\n Availability Impact - None\r\n\r\nCVSS Temporal Score - 6.4\r\n Exploitability - Functional\r\n Remediation Level - Official-Fix\r\n Report Confidence - Confirmed\r\n\r\n\r\nImpact\r\n======\r\n\r\nTransparent Firewall Packet Buffer Exhaustion Vulnerability\r\n+----------------------------------------------------------\r\n\r\nSuccessful exploitation of this vulnerability could cause a decrease\r\nin the number of available packet buffers. Repeated exploitation\r\ncould eventually deplete all available packet buffers, which may\r\ncause an appliance to stop forwarding traffic.\r\n\r\nSCCP Inspection Denial of Service Vulnerability\r\n+----------------------------------------------\r\n\r\nSuccessful exploitation of this vulnerability could cause a reload of\r\nthe affected device. Repeated exploitation may result in a sustained\r\ndenial of service condition.\r\n\r\nRIP Denial of Service Vulnerability\r\n+----------------------------------\r\n\r\nSuccessful exploitation of this vulnerability could cause a reload of\r\nthe affected device. Repeated exploitation may result in a sustained\r\ndenial of service condition.\r\n\r\nUnauthorized File System Access Vulnerability\r\n+--------------------------------------------\r\n\r\nSuccessful exploitation of this vulnerability could allow\r\nunauthorized, unauthenticated users to retrieve files that are stored\r\nin an affected appliance's file system, which may contain sensitive\r\ninformation.\r\n\r\nSoftware Versions and Fixes\r\n===========================\r\n\r\nWhen considering software upgrades, also consult\r\nhttp://www.cisco.com/go/psirt and any subsequent advisories to determine\r\nexposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should exercise caution to be certain the\r\ndevices to be upgraded contain sufficient memory and that current\r\nhardware and software configurations will continue to be supported\r\nproperly by the new release. If the information is not clear, contact\r\nthe Cisco Technical Assistance Center (TAC) or your contracted\r\nmaintenance provider for assistance.\r\n\r\n+---------------------------------------+\r\n| Vulnerability | Major | First Fixed |\r\n| | Release | Release |\r\n|---------------+---------+-------------|\r\n| | | 7.0(8.12); |\r\n| | | available |\r\n| | 7.0 | late |\r\n| | | February |\r\n| | | 2011 |\r\n| |---------+-------------|\r\n| | | Vulnerable; |\r\n| | 7.1 | migrate to |\r\n| | | 7.2(5.2) |\r\n|Transparent |---------+-------------|\r\n| Firewall | 7.2 | 7.2(5.2) |\r\n|Packet Buffer |---------+-------------|\r\n| Exhaustion | 8.0 | 8.0(5.21) |\r\n|Vulnerability |---------+-------------|\r\n| (CSCtj04707) | | 8.1(2.49); |\r\n| | 8.1 | available |\r\n| | | early March |\r\n| | | 2011 |\r\n| |---------+-------------|\r\n| | 8.2 | 8.2(3.6) |\r\n| |---------+-------------|\r\n| | 8.3 | 8.3(2.7) |\r\n| |---------+-------------|\r\n| | 8.4 | Not |\r\n| | | vulnerable |\r\n|---------------+---------+-------------|\r\n| | 7.0 | 7.0(8.11) |\r\n| |---------+-------------|\r\n| | | Vulnerable; |\r\n| | 7.1 | migrate to |\r\n| | | 7.2(5.1) |\r\n| |---------+-------------|\r\n| SCCP | 7.2 | 7.2(5.1) |\r\n|Inspection |---------+-------------|\r\n| Denial of | 8.0 | 8.0(5.19) |\r\n|Service |---------+-------------|\r\n| Vulnerability | 8.1 | 8.1(2.47) |\r\n|(CSCtg69457) |---------+-------------|\r\n| | 8.2 | 8.2(2.19) |\r\n| |---------+-------------|\r\n| | 8.3 | 8.3(1.8) |\r\n| |---------+-------------|\r\n| | 8.4 | Not |\r\n| | | vulnerable |\r\n|---------------+---------+-------------|\r\n| | 7.0 | Not |\r\n| | | vulnerable |\r\n| |---------+-------------|\r\n| | 7.1 | Not |\r\n| | | vulnerable |\r\n| |---------+-------------|\r\n| | 7.2 | Not |\r\n| RIP Denial of | | vulnerable |\r\n|Service |---------+-------------|\r\n| Vulnerability | 8.0 | 8.0(5.20) |\r\n|(CSCtg66583) |---------+-------------|\r\n| | 8.1 | 8.1(2.48) |\r\n| |---------+-------------|\r\n| | 8.2 | 8.2(3) |\r\n| |---------+-------------|\r\n| | 8.3 | 8.3(2.1) |\r\n| |---------+-------------|\r\n| | 8.4 | Not |\r\n| | | vulnerable |\r\n|---------------+---------+-------------|\r\n| | 7.0 | Not |\r\n| | | vulnerable |\r\n| |---------+-------------|\r\n| | 7.1 | Not |\r\n| | | vulnerable |\r\n| |---------+-------------|\r\n| | 7.2 | Not |\r\n| | | vulnerable |\r\n|Unauthorized |---------+-------------|\r\n| File System | 8.0 | 8.0(5.23) |\r\n|Access |---------+-------------|\r\n| Vulnerability | | 8.1(2.49); |\r\n| (CSCtk12352) | 8.1 | available |\r\n| | | early March |\r\n| | | 2011 |\r\n| |---------+-------------|\r\n| | 8.2 | 8.2(4.1) |\r\n| |---------+-------------|\r\n| | 8.3 | 8.3(2.13) |\r\n| |---------+-------------|\r\n| | 8.4 | Not |\r\n| | | vulnerable |\r\n+---------------------------------------+\r\n\r\nRecommended Releases\r\n+-------------------\r\n\r\nThe following table lists all recommended releases. These recommended\r\nreleases contain the fixes for all vulnerabilities in this advisory.\r\nCisco recommends upgrading to a release that is equal to or later\r\nthan these recommended releases.\r\n\r\n+------------------------------------------------------------+\r\n| Major Release | Recommended Release |\r\n|----------------+-------------------------------------------|\r\n| 7.0 | 7.0(8.12); available late February 2011 |\r\n|----------------+-------------------------------------------|\r\n| 7.1 | Migrate to 7.2(5.2) |\r\n|----------------+-------------------------------------------|\r\n| 7.2 | 7.2(5.2) |\r\n|----------------+-------------------------------------------|\r\n| 8.0 | 8.0(5.23) |\r\n|----------------+-------------------------------------------|\r\n| 8.1 | 8.1(2.49); available early March 2011 |\r\n|----------------+-------------------------------------------|\r\n| 8.2 | 8.2(4.1) |\r\n|----------------+-------------------------------------------|\r\n| 8.3 | 8.3(2.13) |\r\n|----------------+-------------------------------------------|\r\n| 8.4 | 8.4(1) |\r\n+------------------------------------------------------------+\r\n\r\nSoftware Download\r\n+----------------\r\n\r\nCisco ASA Software can be downloaded from the Software Center on\r\nCisco.com by visiting http://www.cisco.com/cisco/software/navigator.html\r\nand navigating to Products > Security > Firewall > Firewall Appliances\r\n> Cisco ASA 5500 Series Adaptive Security Appliances > <your Cisco ASA\r\nmodel> > Adaptive Security Appliance (ASA) Software.\r\n\r\nWorkarounds\r\n===========\r\n\r\nThis Cisco Security Advisory describes multiple distinct\r\nvulnerabilities. These vulnerabilities and their respective workarounds\r\nare independent of each other.\r\n\r\nTransparent Firewall Packet Buffer Exhaustion Vulnerability\r\n+----------------------------------------------------------\r\n\r\nThere are no workarounds for this vulnerability.\r\n\r\nSCCP Inspection Denial of Service Vulnerability\r\n+----------------------------------------------\r\n\r\nAdministrators can mitigate this vulnerability by disabling SCCP\r\ninspection if it is not required. Administrators can disable SCCP\r\ninspection by issuing the "no inspect skinny" command in class\r\nconfiguration submode in the policy map configuration.\r\n\r\nRIP Denial of Service Vulnerability\r\n+----------------------------------\r\n\r\nThere are no workarounds for Cisco ASA Software version 8.0 and 8.1.\r\nOn Cisco ASA Software version 8.2 and later, administrators can\r\nconfigure a non-global media termination address by specifying a\r\ntermination address that will be tied to a specific interface. For\r\nexample:\r\n\r\n router rip\r\n ...\r\n\r\n !\r\n\r\n media-termination <instance name>\r\n address <IP address> interface <interface name>\r\n\r\n !\r\n\r\n <Rest of phone proxy feature configuration>\r\n\r\nUnauthorized File System Access Vulnerability\r\n+--------------------------------------------\r\n\r\nThere are no workarounds for this vulnerability.\r\n\r\nObtaining Fixed Software\r\n========================\r\n\r\nCisco has released free software updates that address these\r\nvulnerabilities. Prior to deploying software, customers should\r\nconsult their maintenance provider or check the software for feature\r\nset compatibility and known issues specific to their environment.\r\n\r\nCustomers may only install and expect support for the feature\r\nsets they have purchased. By installing, downloading, accessing\r\nor otherwise using such software upgrades, customers agree to be\r\nbound by the terms of Cisco's software license terms found at\r\nhttp://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html,\r\nor as otherwise set forth at Cisco.com Downloads at\r\nhttp://www.cisco.com/public/sw-center/sw-usingswc.shtml.\r\n\r\nDo not contact psirt@cisco.com or security-alert@cisco.com for\r\nsoftware upgrades.\r\n\r\nCustomers with Service Contracts\r\n+-------------------------------\r\n\r\nCustomers with contracts should obtain upgraded software through\r\ntheir regular update channels. For most customers, this means that\r\nupgrades should be obtained through the Software Center on Cisco's\r\nworldwide website at http://www.cisco.com.\r\n\r\nCustomers using Third Party Support Organizations\r\n+------------------------------------------------\r\n\r\nCustomers whose Cisco products are provided or maintained through\r\nprior or existing agreements with third-party support organizations,\r\nsuch as Cisco Partners, authorized resellers, or service providers\r\nshould contact that support organization for guidance and assistance\r\nwith the appropriate course of action in regards to this advisory.\r\n\r\nThe effectiveness of any workaround or fix is dependent on specific\r\ncustomer situations, such as product mix, network topology, traffic\r\nbehavior, and organizational mission. Due to the variety of affected\r\nproducts and releases, customers should consult with their service\r\nprovider or support organization to ensure any applied workaround or\r\nfix is the most appropriate for use in the intended network before it\r\nis deployed.\r\n\r\nCustomers without Service Contracts\r\n+----------------------------------\r\n\r\nCustomers who purchase direct from Cisco but do not hold a Cisco\r\nservice contract, and customers who purchase through third-party\r\nvendors but are unsuccessful in obtaining fixed software through\r\ntheir point of sale should acquire upgrades by contacting the Cisco\r\nTechnical Assistance Center (TAC). TAC contacts are as follows.\r\n\r\n * +1 800 553 2447 (toll free from within North America)\r\n * +1 408 526 7209 (toll call from anywhere in the world)\r\n * e-mail: tac@cisco.com\r\n\r\nCustomers should have their product serial number available and be\r\nprepared to give the URL of this notice as evidence of entitlement to\r\na free upgrade. Free upgrades for non-contract customers must be\r\nrequested through the TAC.\r\n\r\nRefer to\r\nhttp://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html\r\nfor additional TAC contact information, including localized telephone\r\nnumbers, and instructions and e-mail addresses for use in various\r\nlanguages.\r\n\r\nExploitation and Public Announcements\r\n=====================================\r\n\r\nThe Cisco PSIRT is not aware of any public announcements or malicious\r\nuse of the vulnerabilities described in this advisory.\r\n\r\nThe Transparent Firewall Packet Buffer Exhaustion Vulnerability, SCCP\r\nInspection Denial of Service Vulnerability, and RIP Denial of Service\r\nVulnerability were found during internal testing.\r\n\r\nThe Unauthorized File System Access Vulnerability was discovered\r\nduring the resolution of customer support cases.\r\n\r\nStatus of this Notice: FINAL\r\n============================\r\n\r\nTHIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY\r\nKIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF\r\nMERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE\r\nINFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS\r\nAT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS\r\nDOCUMENT AT ANY TIME.\r\n\r\nA stand-alone copy or Paraphrase of the text of this document that\r\nomits the distribution URL in the following section is an\r\nuncontrolled copy, and may lack important information or contain\r\nfactual errors.\r\n\r\nDistribution\r\n============\r\n\r\nThis advisory is posted on Cisco's worldwide website at:\r\n\r\nhttp://www.cisco.com/warp/public/707/cisco-sa-20110223-asa.shtml\r\n\r\nIn addition to worldwide web posting, a text version of this notice\r\nis clear-signed with the Cisco PSIRT PGP key and is posted to the\r\nfollowing e-mail and Usenet news recipients.\r\n\r\n * cust-security-announce@cisco.com\r\n * first-bulletins@lists.first.org\r\n * bugtraq@securityfocus.com\r\n * vulnwatch@vulnwatch.org\r\n * cisco@spot.colorado.edu\r\n * cisco-nsp@puck.nether.net\r\n * full-disclosure@lists.grok.org.uk\r\n * comp.dcom.sys.cisco@newsgate.cisco.com\r\n\r\nFuture updates of this advisory, if any, will be placed on Cisco's\r\nworldwide website, but may or may not be actively announced on\r\nmailing lists or newsgroups. Users concerned about this problem are\r\nencouraged to check the above URL for any updates.\r\n\r\nRevision History\r\n================\r\n\r\n+------------------------------------------------------------+\r\n| Revision 1.0 | 2011-February-23 | Initial public release. |\r\n+------------------------------------------------------------+\r\n\r\nCisco Security Procedures\r\n=========================\r\n\r\nComplete information on reporting security vulnerabilities\r\nin Cisco products, obtaining assistance with security\r\nincidents, and registering to receive security information\r\nfrom Cisco, is available on Cisco's worldwide website at\r\nhttp://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.\r\nThis includes instructions for press inquiries regarding\r\nCisco security notices. All Cisco security advisories are available at\r\nhttp://www.cisco.com/go/psirt.\r\n\r\n+--------------------------------------------------------------------\r\nCopyright 2010-2011 Cisco Systems, Inc. All rights reserved.\r\n+--------------------------------------------------------------------\r\n\r\nUpdated: Feb 23, 2011 Document ID: 112881\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.10 (GNU/Linux)\r\n\r\niF4EAREIAAYFAk1lMPwACgkQQXnnBKKRMNBMBQD/a+ok1yfH7Fb21ZoPDh56AC4A\r\nV/yl9nhgKFu3M/lDOqgA/0kybpk0NolgXRBExnKPMPOI94KiHhhPQtUYxo/j3tCH\r\n=sciX\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2011-02-28T00:00:00", "published": "2011-02-28T00:00:00", "id": "SECURITYVULNS:DOC:25811", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25811", "title": "Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "cisco": [{"lastseen": "2020-12-24T11:42:03", "bulletinFamily": "software", "cvelist": ["CVE-2011-0393", "CVE-2011-0394", "CVE-2011-0395", "CVE-2011-0396"], "description": "", "modified": "2011-02-23T16:00:00", "published": "2011-02-23T16:00:00", "id": "CISCO-SA-20110223-ASA", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110223-asa", "type": "cisco", "title": "Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2021-03-01T01:39:30", "description": "The remote Cisco ASA device is missing a security patch and may be\naffected by the following issues :\n\n - When configured for transparent firewall mode, a packet\n buffer exhaustion vulnerability could cause the appliance\n to stop forwarding traffic. (CVE-2011-0393)\n\n - When SCCP inspection is enabled, a malformed SCCP\n message could cause the appliance to reload.\n (CVE-2011-0394)\n\n - If both RIP and the Cisco Phone Proxy feature are enabled,\n the appliance may reload when processing valid\n RIP updates. (CVE-2011-0395)\n\n - When the appliance is configured as a local CA server,\n unauthorized users can obtain sensitive data without\n providing authentication. (CVE-2011-0396)", "edition": 27, "published": "2011-03-09T00:00:00", "title": "Cisco ASA 5500 Series Multiple Vulnerabilities (cisco-sa-20110223-asa)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-0395", "CVE-2011-0393", "CVE-2011-0396", "CVE-2011-0394"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/a:cisco:adaptive_security_appliance_software", "cpe:/h:cisco:asa_5500"], "id": "CISCO-SA-20110223-ASA.NASL", "href": "https://www.tenable.com/plugins/nessus/52586", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(52586);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/11/15 20:50:20\");\n \n script_cve_id(\"CVE-2011-0393\", \"CVE-2011-0394\", \"CVE-2011-0395\", \"CVE-2011-0396\");\n script_bugtraq_id(46518, 46524);\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCtg66583\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCtg69457\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCtj04707\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCtk12352\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-20110223-asa\");\n\n script_name(english:\"Cisco ASA 5500 Series Multiple Vulnerabilities (cisco-sa-20110223-asa)\");\n script_summary(english:\"Checks the version of the remote ASA.\");\n \n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote security device is missing a vendor-supplied security patch.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote Cisco ASA device is missing a security patch and may be\naffected by the following issues :\n\n - When configured for transparent firewall mode, a packet\n buffer exhaustion vulnerability could cause the appliance\n to stop forwarding traffic. (CVE-2011-0393)\n\n - When SCCP inspection is enabled, a malformed SCCP\n message could cause the appliance to reload.\n (CVE-2011-0394)\n\n - If both RIP and the Cisco Phone Proxy feature are enabled,\n the appliance may reload when processing valid\n RIP updates. (CVE-2011-0395)\n\n - When the appliance is configured as a local CA server,\n unauthorized users can obtain sensitive data without\n providing authentication. (CVE-2011-0396)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?40e645f7\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7d46864f\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Apply the appropriate patch (see plugin output).\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_set_attribute(attribute:\"vuln_publication_date\",value:\"2011/02/23\");\n script_set_attribute(attribute:\"patch_publication_date\",value:\"2011/02/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/03/09\");\n script_set_attribute(attribute:\"plugin_type\",value:\"local\");\n script_set_attribute(attribute:\"cpe\",value:\"cpe:/h:cisco:asa_5500\");\n script_set_attribute(attribute:\"cpe\",value:\"cpe:/a:cisco:adaptive_security_appliance_software\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.\");\n script_family(english:\"CISCO\");\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Cisco/ASA\", \"Host/Cisco/ASA/model\");\n exit(0);\n}\n\n\ninclude(\"cisco_func.inc\");\ninclude(\"audit.inc\");\n\nasa = get_kb_item_or_exit('Host/Cisco/ASA');\nmodel = get_kb_item_or_exit('Host/Cisco/ASA/model');\nver = extract_asa_version(asa);\nif (isnull(ver)) audit(AUDIT_FN_FAIL, 'extract_asa_version');\n\nif (model !~ '^55[0-9][0-9]')\n audit(AUDIT_HOST_NOT, 'ASA 5500');\n\n# first check 7.1 (the recommendation is to migrate to 7.2 and upgrade)\nif (ver =~ '^7\\\\.1($|[^0-9])')\n{\n report =\n '\\n Installed release : ' + ver +\n '\\n Fixed release : 7.2(5.2)\\n';\n security_hole(port:0, extra:report);\n exit(0);\n}\n\n# compare the ASA version versus all recommended releases. The\n# comparison is only made if the major versions match up\nrecommended_releases = make_list('7.0(8.12)', '7.2(5.2)', '8.0(5.23)', '8.1(2.49)', '8.2(4.1)', '8.3(2.13)', '8.4(1)');\nforeach patch (recommended_releases)\n{\n if (check_asa_release(version:ver, patched:patch))\n {\n report =\n '\\n Installed release : ' + ver +\n '\\n Fixed release : ' + patch + '\\n';\n security_hole(port:0, extra:report);\n exit(0);\n }\n}\n\naudit(AUDIT_INST_VER_NOT_VULN, 'ASA', ver);\n\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}]}