安全研究

安全漏洞
Cisco ASA 5500和FWSM SCCP Inspection远程拒绝服务漏洞

发布日期:2011-02-23
更新日期:2011-02-23

受影响系统:
Cisco Firewall Services Module Cisco Firewall Services Module
Cisco Firewall Services Module Cisco Firewall Services Module
Cisco Firewall Services Module Cisco Firewall Services Module
Cisco Firewall Services Module Cisco Firewall Services Module
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
不受影响系统:
Cisco Firewall Services Module Cisco Firewall Services Module
Cisco Firewall Services Module Cisco Firewall Services Module
Cisco Firewall Services Module Cisco Firewall Services Module
Cisco Firewall Services Module Cisco Firewall Services Module
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
Cisco isco ASA 5500 Series Adaptive Security Appliance Cisco ASA 5500 Series Adaptive
描述:
BUGTRAQ  ID: 46518
CVE(CAN) ID: CVE-2011-0394

Cisco ASA 5500系列自适应安全设备是用于提供安全和VPN服务的模块化平台,可提供防火墙、IPS、anti-X和VPN服务。FWSM是防火墙服务模块。

Cisco ASA 5500系列8.2(3)在实现上存在远程拒绝服务漏洞,远程攻击者可利用此漏洞造成拒绝服务。

Cisco ASA 5500 Series Adaptive Security Appliances受此漏洞的影响,可在处理
畸形SCCP消息时重新加载。如果启用了SCCP监测,设备才会受到影响。仅传输流量可触发此漏洞;到设备的流量不会触发此漏洞。

1)  在用作透明防火墙时,可通过向没有配置IPv6的设备发送IPv6流量,利用报文缓冲
区耗尽错误造成设备停止发送流量;

2)  在处理某些SCCP信息时的错误可造成通过传输的特制SCCP信息造成设备重新加载;


<*链接:http://www.cisco.com/warp/public/707/cisco-sa-20110223-asa.shtml
*>

建议:
厂商补丁:

Cisco
-----
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.cisco.com/warp/public/707/advisory.html

浏览次数:2414
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障