A vulnerability in the detection engine reassembly of HTTP packets for Cisco Firepower System Software prior to 6.0.1 could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper handling of an HTTP packet stream. An attacker could exploit this vulnerability by sending a crafted HTTP packet stream to the detection engine on the targeted device. An exploit could allow the malicious user to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco firepower management center 5.4.1.5 |
||
cisco firepower management center 5.3.1.3 |
||
cisco firepower management center 5.3.1.4 |
||
cisco firepower management center 5.3.0.2 |
||
cisco firepower management center 5.3.0.4 |
||
cisco firepower management center 5.4.1.1 |
||
cisco firepower management center 5.4.0.2 |
||
cisco firepower management center 5.3.0 |
||
cisco firepower management center 5.4.1.6 |
||
cisco firepower management center 5.3.1.5 |
||
cisco firepower management center 5.4.1.2 |
||
cisco firepower management center 5.4_base |
||
cisco firepower management center 5.4.1.4 |
||
cisco firepower management center 5.3.1 |
||
cisco firepower management center 5.3.0.3 |
||
cisco firepower management center 5.3.1.6 |
||
cisco firepower management center 6.0.0 |
||
cisco firepower management center 6.0.0.1 |
||
cisco firepower management center 6.0.0.0 |
||
cisco firepower management center 5.4.1.3 |
||
cisco firepower management center 5.4.1 |
||
cisco firepower management center 6.0.1 |
||
cisco firepower management center 6.0_base |
||
cisco firepower management center 5.4.0 |