Multiple vulnerabilities in the Media Gateway Control Protocol (MGCP) inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerabilities are due to inefficient memory management. An attacker could exploit these vulnerabilities by sending crafted MGCP packets through an affected device. An exploit could allow the malicious user to cause memory exhaustion resulting in a restart of an affected device, causing a DoS condition for traffic traversing the device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco firepower threat defense |
||
cisco asa_5505_firmware 9.10\\(1.3\\) |
||
cisco asa_5510_firmware 9.10\\(1.3\\) |
||
cisco asa_5512-x_firmware 9.10\\(1.3\\) |
||
cisco asa_5515-x_firmware 9.10\\(1.3\\) |
||
cisco asa_5520_firmware 9.10\\(1.3\\) |
||
cisco asa_5525-x_firmware 9.10\\(1.3\\) |
||
cisco asa_5540_firmware 9.10\\(1.3\\) |
||
cisco asa_5545-x_firmware 9.10\\(1.3\\) |
||
cisco asa_5550_firmware 9.10\\(1.3\\) |
||
cisco asa_5555-x_firmware 9.10\\(1.3\\) |
||
cisco asa_5580_firmware 9.10\\(1.3\\) |
||
cisco asa_5585-x_firmware 9.10\\(1.3\\) |
||
cisco adaptive security appliance software |
Switchzilla issues a whopping 30+ patches in time for the long UK weekend
Cisco has emitted a fresh round of software updates to address nearly three dozen security holes in its products. The patches, released over May 6 and 7, include 12 issues considered high-severity bugs, and another 22 classified as moderate severity. One of the holes has two CVE numbers assigned to it, so that's a total of 35 CVE-listed security vulnerabilities. Despite the absence of a critical remote code or command execution bug, the patches include a number of serious programming blunders, p...