Cisco Security Advisory - A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected system to reload. The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending a request to an affected Cisco ASA appliance to cause it to generate a DNS request packet. The attacker would need to spoof the reply packet with a crafted DNS response.
5ee7857505fa994098c9c9e4ce490ca05c88b03d2bf0c2ad43f540c2734e5f58
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Cisco Security Advisory: Cisco ASA Software DNS Denial of Service Vulnerability
Advisory ID: cisco-sa-20151021-asa-dns2
Revision 1.0
For Public Release 2015 October 21 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected system to reload.
The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending a request to an affected Cisco ASA appliance to cause it to generate a DNS request packet. The attacker would need to spoof the reply packet with a crafted DNS response.
Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns2
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - https://gpgtools.org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=32lo
-----END PGP SIGNATURE-----