CERT mailing list archives

Cisco Releases Security Updates


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Wed, 28 Sep 2016 21:07:43 -0500

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:

 

Cisco Releases Security Updates [ 
https://www.us-cert.gov/ncas/current-activity/2016/09/28/Cisco-Releases-Security-Updates ] 09/28/2016 09:00 PM EDT 
Original release date: September 28, 2016

Cisco has released security updates to address vulnerabilities in multiple products. Exploitation of one of these 
vulnerabilities could allow a remote attacker to take over an affected system.

Users and administrators are encouraged to review the following Cisco Security Advisories and apply the necessary 
updates:


  * Cisco Email Security Appliance Internal Testing Interface Vulnerability  [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160922-esa ] 
  * Cisco IOS and IOS XE Software Smart Install Memory Leak Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi ] 
  * Cisco IOS and IOS XE Software Multicast Routing Denial of Service Vulnerabilities [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-msdp ] 
  * Cisco IOS and IOS XE Software IP Detail Record Denial of Service Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ipdr ] 
  * Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Fragmentation Denial of Service Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ios-ikev1 ] 
  * Cisco IOS and IOS XE Software H.323 Message Validation Denial of Service Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-h323 ] 
  * Cisco IOS XE Software IP Fragment Reassembly Denial of Service Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-frag ] 
  * Cisco Firepower Management Center SQL Injection Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fpmc ] 
  * Cisco Firepower Management Center Privilege Escalation Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-fmc1 ] 
  * Cisco IOS XE Software NAT Denial of Service Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-esp-nat ] 
  * Cisco IOS and IOS XE Software DNS Forwarder Denial of Service Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-dns ] 
  * Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-cip ] 
  * Cisco IOS and IOS XE Software AAA Login Denial of Service Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-aaados ] 
________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: