exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20151021-asa-dns2

Cisco Security Advisory 20151021-asa-dns2
Posted Oct 22, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected system to reload. The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending a request to an affected Cisco ASA appliance to cause it to generate a DNS request packet. The attacker would need to spoof the reply packet with a crafted DNS response.

tags | advisory, remote, spoof
systems | cisco
SHA-256 | 5ee7857505fa994098c9c9e4ce490ca05c88b03d2bf0c2ad43f540c2734e5f58

Cisco Security Advisory 20151021-asa-dns2

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco ASA Software DNS Denial of Service Vulnerability

Advisory ID: cisco-sa-20151021-asa-dns2

Revision 1.0

For Public Release 2015 October 21 16:00 UTC (GMT)

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected system to reload.

The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending a request to an affected Cisco ASA appliance to cause it to generate a DNS request packet. The attacker would need to spoof the reply packet with a crafted DNS response.

Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns2
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - https://gpgtools.org
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=32lo
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close