A vulnerability in DNS over IPv6 packet processing for Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to cause the device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper length validation of a field in an IPv6 DNS packet. An attacker could exploit this vulnerability by sending a crafted DNS query over IPv6, which traverses the affected device. An exploit could allow the malicious user to cause the device to reload, resulting in a DoS condition. This vulnerability is specific to DNS over IPv6 traffic only.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco firepower threat defense |
||
cisco asa_5505_firmware 9.4\\(1\\) |
||
cisco asa_5505_firmware 96.4\\(0.42\\) |
||
cisco asa_5510_firmware 9.4\\(1\\) |
||
cisco asa_5510_firmware 96.4\\(0.42\\) |
||
cisco asa_5512-x_firmware 9.4\\(1\\) |
||
cisco asa_5512-x_firmware 96.4\\(0.42\\) |
||
cisco asa_5515-x_firmware 9.4\\(1\\) |
||
cisco asa_5515-x_firmware 96.4\\(0.42\\) |
||
cisco asa_5520_firmware 9.4\\(1\\) |
||
cisco asa_5520_firmware 96.4\\(0.42\\) |
||
cisco asa_5525-x_firmware 9.4\\(1\\) |
||
cisco asa_5525-x_firmware 96.4\\(0.42\\) |
||
cisco asa_5540_firmware 9.4\\(1\\) |
||
cisco asa_5540_firmware 96.4\\(0.42\\) |
||
cisco asa_5545-x_firmware 9.4\\(1\\) |
||
cisco asa_5545-x_firmware 96.4\\(0.42\\) |
||
cisco asa_5550_firmware 9.4\\(1\\) |
||
cisco asa_5550_firmware 96.4\\(0.42\\) |
||
cisco asa_5555-x_firmware 9.4\\(1\\) |
||
cisco asa_5555-x_firmware 96.4\\(0.42\\) |
||
cisco asa_5580_firmware 9.4\\(1\\) |
||
cisco asa_5580_firmware 96.4\\(0.42\\) |
||
cisco asa_5585-x_firmware 9.4\\(1\\) |
||
cisco asa_5585-x_firmware 96.4\\(0.42\\) |
||
cisco adaptive security appliance software |
Switchzilla issues a whopping 30+ patches in time for the long UK weekend
Cisco has emitted a fresh round of software updates to address nearly three dozen security holes in its products. The patches, released over May 6 and 7, include 12 issues considered high-severity bugs, and another 22 classified as moderate severity. One of the holes has two CVE numbers assigned to it, so that's a total of 35 CVE-listed security vulnerabilities. Despite the absence of a critical remote code or command execution bug, the patches include a number of serious programming blunders, p...