Bugtraq mailing list archives

Cisco Security Advisory: Cisco ASA Software DNS Denial of Service Vulnerability


From: Cisco Systems Product Security Incident Response Team <psirt () cisco com>
Date: Wed, 21 Oct 2015 12:43:05 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco ASA Software DNS Denial of Service Vulnerability

Advisory ID: cisco-sa-20151021-asa-dns1

Revision 1.0

For Public Release 2015 October 21 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, 
remote attacker to cause an affected system to reload.

The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending 
a request to an affected Cisco ASA appliance to cause it to generate a DNS request packet. The attacker would need to 
spoof the reply packet with a crafted DNS response.


Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are 
not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns1


-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - https://gpgtools.org
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=ugAt
-----END PGP SIGNATURE-----


Current thread: