exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20160302-wsa

Cisco Security Advisory 20160302-wsa
Posted Mar 3, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the web proxy framework of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker with the ability to negotiate a secure connection from within the trusted network to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to incorrect processing of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS request packet through the affected device. A successful exploit could allow an attacker to create a DoS condition, causing all requests traversing the WSA to be dropped. The condition is temporary and no manual intervention is required to restore functionality. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

tags | advisory, remote, web, denial of service
systems | cisco
SHA-256 | b61056cc436d6411ccd61d17f85de34dbd24fd081a1c562f8aa2cea0e14b9b1b

Cisco Security Advisory 20160302-wsa

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco Web Security Appliance HTTPS Packet Processing Denial of Service Vulnerability

Advisory ID: cisco-sa-20160302-wsa

Revision 1.0

Published: 2016 March 2 16:00 GMT
+---------------------------------------------------------------------

Summary
=======

A vulnerability in the web proxy framework of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker with the ability to negotiate a secure connection from within the trusted network to cause a denial of service (DoS) condition on the affected device.

The vulnerability is due to incorrect processing of HTTPS packets. An attacker could exploit this vulnerability by sending a malformed HTTPS request packet through the affected device. A successful exploit could allow an attacker to create a DoS condition, causing all requests traversing the WSA to be dropped. The condition is temporary and no manual intervention is required to restore functionality.

Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-wsa
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org

iQIcBAEBCgAGBQJW1xjZAAoJEK89gD3EAJB5qt0QAOMm2cWsVxNKWQul+HYxzATd
KI82WfeAgoBxDMXsC1GcpnAwPEbOQMNW2lz9fg/M5dNoEKQjnsHm2pXQIj8OlT8D
AYw3PmLac/Hs0EWz9G7b6MeuyyHcKTlLRNtg+K/wnX4Z5sqXe/p3cBJixmFbJZjC
mkRXpIZrt9XjLZDBi89PQPzIDkJ5oDB7S+oWR/H9QBYyy3d723Fb6tRwzNvKCpLx
IoYLVM8xV9Q+xTSJcPCrbER8wPZDm163SwTxkRs2RpY5uVswQKwJuyOzNUnQbcvX
9syjzPWE9WK8LZcy0fnz2n55Te1pcjDWadoftu+ZuOCiQHsAdmhhjSOuUZdCON2Z
oF0q0Hd5rN9mB6TG4zIUGAsrwNWAJ4XKeWxJVyhIsuBIlAzFsDGRIMurRy+N97xS
ZbfQ2yD27Ktm2E8aO1yqAerPEi8KQWfrOdvSxKWnxB0b4SmK729DPBOMk77O1JB6
StGeVtS6yp/PazvRAG7VPqgwneAbkxDOJNcNT966hjUcmgJGiURtWkpWd3RTUFh8
vjC2ei8eM3jJ2novh6XcQmRh9Z9i5h6BYQkNqs3K5egM/H6G3N36Ksk+L/cdCOdG
EF1iST+L6pX2H51mmMufGfJg/sZNBRF4LL3zGTDxat8RLpwISzypRxQwLemZYC20
GEO5+YGIotDsyPcoQ3HL
=aqwj
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close