In association with heise online

24 October 2008, 10:43

Cisco removes vulnerabilities in ASA and PIX

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Cisco has released updates for its Adaptive Security Appliances (ASA) and PIX Security Appliances to remove several vulnerabilities. If an appliance is configured for IPSec or SSL VPN access, the vulnerabilities allow attackers to bypass authentication when signing into a Windows NT domain.

In addition, specially crafted packets can cause a memory leak in the ASA's Crypto Accelerator which can be exploited to trigger Denial of Service attacks. Apart from SSL VPNs and IPSec, the accelerator is also used by several other services which provide secure connections. Specially crafted IPv6 packets can also cause a vulnerable appliance to reboot. Which version is affected by which vulnerability is explained in the vendor's original security advisory.

See also:

(jbe)

Print Version | Send by email | Permalink: http://h-online.com/-737775
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit