Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2005-12-22 |
Product | Pix Firewall | Last view | 2016-08-18 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2016-08-18 | CVE-2016-6366 | Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON. |
5 | 2006-07-27 | CVE-2006-3906 | Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected. |
7.5 | 2006-05-09 | CVE-2006-0515 | Cisco PIX/ASA 7.1.x before 7.1(2) and 7.0.x before 7.0(5), PIX 6.3.x before 6.3.5(112), and FWSM 2.3.x before 2.3(4) and 3.x before 3.1(7), when used with Websense/N2H2, allows remote attackers to bypass HTTP access restrictions by splitting the GET method of an HTTP request into multiple packets, which prevents the request from being sent to Websense for inspection, aka bugs CSCsc67612, CSCsc68472, and CSCsd81734. |
7.5 | 2005-12-22 | CVE-2005-4499 | The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:5299 | Cisco Multiple Products IKE Packet DoS |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
29068 | Cisco Multiple Products IKE Phase-1 Packet Saturation DoS |
25453 | Cisco PIX/ASA/FWSM WebSense URL Filter Bypass |
22193 | Cisco Secure Access Control Server (ACS) RAS/NAS Downloadable IP ACL Disclosure |
Snort® IPS/IDS
Date | Description |
---|---|
2016-08-17 | Cisco ASA SNMP OID parsing stack buffer overflow attempt RuleID : 39885 - Type : PROTOCOL-SNMP - Revision : 4 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-08-25 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sn-CSCva92151-asa.nasl - Type: ACT_GATHER_INFO |