ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA17553] Cisco ISAKMP IKE Message Processing Denial of Service




> 
> 
> TITLE:
> Cisco ISAKMP IKE Message Processing Denial of Service
> 
> SECUNIA ADVISORY ID:
> SA17553
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/17553/
> 
> CRITICAL:
> Moderately critical
> 
> IMPACT:
> DoS
> 
> WHERE:
> From remote
> 
> OPERATING SYSTEM:
> Cisco SAN-OS 1.x (MDS 9000 Switches)
> http://secunia.com/product/3214/
> Cisco PIX 7.x
> http://secunia.com/product/6102/
> Cisco PIX 6.x
> http://secunia.com/product/56/
> Cisco PIX 5.x
> http://secunia.com/product/59/
> Cisco PIX 4.x
> http://secunia.com/product/706/
> Cisco IOS R12.x
> http://secunia.com/product/50/
> Cisco IOS 12.x
> http://secunia.com/product/182/
> Cisco SAN-OS 2.x (MDS 9000 Switches)
> http://secunia.com/product/6101/
> Cisco VPN 3000 Concentrator
> http://secunia.com/product/90/
> 
> SOFTWARE:
> Cisco Firewall Services Module (FWSM) 2.x
> http://secunia.com/product/5088/
> Cisco Firewall Services Module (FWSM) 1.x
> http://secunia.com/product/2273/
> 
> DESCRIPTION:
> A vulnerability has been reported in various Cisco products, which
> can be exploited by malicious people to cause a DoS (Denial of
> Service).
> 
> The vulnerability is caused due to errors in the processing of IKEv1
> Phase 1 protocol exchange messages. This can be exploited to cause a
> DoS.
> 
> The vulnerability has been reported in the following products.
> * Cisco IOS versions based on 12.2SXD, 12.3T, 12.4 and 12.4T
> * Cisco PIX Firewall versions up to but not including 6.3(5)
> * Cisco PIX Firewall/ASA versions up to but not including 7.0.1.4
> * Cisco Firewall Services Module (FWSM) versions up to but not
> including 2.3(3)
> * Cisco VPN 3000 Series Concentrators versions up to but not
> including 4.1(7)H and 4.7(2)B
> * Cisco MDS Series SanOS versions up to but not including 2.1(2)
> 
> Note: For Cisco IOS, only images that contain the Crypto Feature Set
> are vulnerable.
> 
> SOLUTION:
> See patch matrix in vendor advisory for information about fixes.
> http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.s
> html#software
> 
> PROVIDED AND/OR DISCOVERED BY:
> Oulu University Secure Programming Group (OUSPG) .
> 
> ORIGINAL ADVISORY:
> http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml
> 
> ----------------------------------------------------------------------
 




 




Copyright © Lexa Software, 1996-2009.