A vulnerability in the interaction between the Server Message Block (SMB) protocol preprocessor and the Snort 3 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote malicious user to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error-checking when the Snort 3 detection engine is processing SMB traffic. An attacker could exploit this vulnerability by sending a crafted SMB packet stream through an affected device. A successful exploit could allow the malicious user to cause the Snort process to reload, resulting in a DoS condition.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco firepower threat defense 7.1.0 |
||
cisco firepower threat defense 7.2.0.1 |
||
cisco firepower threat defense 7.1.0.1 |
||
cisco firepower threat defense 7.1.0.2 |
||
cisco firepower threat defense 7.2.0 |
||
cisco firepower threat defense 7.2.1 |
||
cisco firepower threat defense 7.2.2 |
||
cisco firepower threat defense 7.2.3 |
||
cisco firepower threat defense 7.3.1.1 |
||
cisco firepower threat defense 7.3.1 |
||
cisco firepower threat defense 7.3.0 |
||
cisco firepower threat defense 7.1.0.3 |