Executive Summary
Summary | |
---|---|
Title | Cisco Firepower System Software Detection Engine Denial of Service Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20181003-fp-smb-snort | First vendor Publication | 2018-10-03 |
Vendor | Cisco | Last vendor Modification | 2018-10-03 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the Server Message Block Version 2 (SMBv2) and Version 3 (SMBv3) protocol implementation for the Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the device to run low on system memory, possibly preventing the device from forwarding traffic. It is also possible that a manual reload of the device may be required to clear the condition. The vulnerability is due to incorrect SMB header validation. An attacker could exploit this vulnerability by sending a custom SMB file transfer through the targeted device. A successful exploit could cause the device to consume an excessive amount of system memory and prevent the SNORT process from forwarding network traffic. This vulnerability can be exploited using either IPv4 or IPv6 in combination with SMBv2 or SMBv3 network traffic. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-smb-snort ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-smb-snort"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJbtOqcXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczGNgP/RfADpCaKEl+0/2OovPlqp6oljqF LV1rGunRmuJT1RR3j7w6AIkqTC8UpquepGS2PKxhNG/m0qrw05jWQHQ0XeQaxKU/ PVWVLaC/sQ7QJJKqQXrV75PPc1Qn358cjVDhqiix8FsPcPZdtHf4sBqS+esZzK3p TOB/6aGPSsWj9kLehXviB6SC80qq+9uNp7PfNB/mrZxEIKOtGV4QScC7s/rYbGrY avohfcRbEhT3lpmwndq7hPVyluCCFg/fQIHRDh76dcZT/PX5VGBFTf/+HNYaj7g6 I3p6I4pwBlg9p2KbIvcM9hMyBBCej0CD5JXJRuSnJmtX/LTc5ofg1pf50k5XM1ou kRR2PoJMBjlovR/VBh90Off66w/y5OXnqJBjRl+Vn2c7It1x7pPLAESLr2q4N/sz wQx6zlysn2Zwbtu5jcSToRpFFbjaW00419hQZM1e6tadfeiXf9IQ8zWCcJ4AuNW4 3oEVC9Ve99zVb1K4930jssKxEyrCPGQKKloW5KAUvp9lfIVHQshkNXcwxNNoOL6l PDGWSK6Kp9rSLVkjX2+TF7FNYz2o0x5zw8wZ2VTD7Tsb1NVgQ4bxzhs3TE1bWi4B HaHcyUCSrlO9sxmnYXFHTc0K3QApB0y7Axuw8ruhCmoYSOI7kbAWOuE2D5b1j7N3 eMZZ1T7v0z6dHyWE =p0Qa END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2019-01-10 17:21:20 |
|
2018-10-05 21:21:50 |
|
2018-10-03 21:18:53 |
|