-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Cisco Security Advisory: Cisco FirePOWER System Software Packet Processing Denial of Service Vulnerability Advisory ID: cisco-sa-20160504-firepower Revision 1.0 For Public Release 2016 May 04 16:00 GMT (UTC) +--------------------------------------------------------------------- Summary ======= A vulnerability in the packet processing functions of Cisco FirePOWER System Software could allow an unauthenticated, remote attacker to cause an affected system to stop inspecting and processing packets, resulting in a denial of service (DoS) condition. The vulnerability is due to improper packet handling by the affected software when packets are passed through the sensing interfaces of an affected system. An attacker could exploit this vulnerability by sending crafted packets through a targeted system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-firepower -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2 Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJXKhrpAAoJEK89gD3EAJB53QoQANWskb8w7+58gNne3stwOPnO vWtuqUDXEIWn6rpcYOD0rJ4WGZN8EbEAO5EdlENj11OxH09FJYUxHD9V8QkUnLq2 8TOzPgyi3TITHAe2gH29US7QaiLxtZgarFtd26OKBX1tsqMUbDzcwhLFg7V9B5r7 XAIjP12OqWP2W0dtbritU4TBku5g6TV83Uj8CWLB7lqzoYKGzEZd6zlgflUB/5ej nc3xpoDC5oQwrftKE58Ea+tHIjCRkTL2kRx1bH+vQ2ewsFlvhXQ6LVR7c1zMBmAe xTuBN9SuNDt8KK9B8bBo0Qcu9UIBOKvNpPVWiTuhr2+SoEs5HLaEwyQQXkGs6yeK oM+IkuuHriZeq8T098hqOb+XO1hOTYJ1DVCRVpul5FUyMCsgg7+LDqPKJbuDORHq AizdNjIzc33V/zwNcIN9Y588788y1YDi5TTtS51h1slo2yOhMljwLL2IjTbkfQjE 5w/jqXSM2Em9U5ZPSJMW9b9MIdkFo48c7N1txCmvGDevDEQ5/RNjuzxixpeV0GeN jfYECZ/bYGn5JfCihWvmlL6zxE43WHnAeqzgTt/NTcLNWvdDQ6FTJwYUbdht3keY 8qIbyeVCkZg+QKBvW1ttgQoX1uYrE5Y2M6vXyhHHrR9FGTRVDZaExISI4QSwrPnG QfCvizSgZ8plD5iNahO8 =2cg8 -----END PGP SIGNATURE-----