exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20151021-asa-dns2

Cisco Security Advisory 20151021-asa-dns2
Posted Oct 22, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected system to reload. The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending a request to an affected Cisco ASA appliance to cause it to generate a DNS request packet. The attacker would need to spoof the reply packet with a crafted DNS response.

tags | advisory, remote, spoof
systems | cisco
SHA-256 | 5ee7857505fa994098c9c9e4ce490ca05c88b03d2bf0c2ad43f540c2734e5f58

Cisco Security Advisory 20151021-asa-dns2

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco ASA Software DNS Denial of Service Vulnerability

Advisory ID: cisco-sa-20151021-asa-dns2

Revision 1.0

For Public Release 2015 October 21 16:00 UTC (GMT)

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected system to reload.

The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending a request to an affected Cisco ASA appliance to cause it to generate a DNS request packet. The attacker would need to spoof the reply packet with a crafted DNS response.

Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns2
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - https://gpgtools.org
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=32lo
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close