Executive Summary
Summary | |
---|---|
Title | Cisco Adaptive Security Appliance (ASA) IKEv1 and IKEv2 contains a buffer overflow vulnerability |
Informations | |||
---|---|---|---|
Name | VU#327976 | First vendor Publication | 2016-02-11 |
Vendor | VU-CERT | Last vendor Modification | 2016-02-16 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#327976Cisco Adaptive Security Appliance (ASA) IKEv1 and IKEv2 contains a buffer overflow vulnerabilityOverviewCisco Adaptive Security Appliance (ASA) Internet Key Exchange versions 1 and 2 (IKEv1 and IKEv2) contains a buffer overflow vulnerability that may be leveraged to gain remote code execution. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditCisco credits David Barksdale, Jordan Gruskovnjak, and Alex Wheeler of Exodus Intelligence for reporting this vulnerability. This document was written by Joel Land. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/327976 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | Cisco ASA IKEv2 invalid fragment length heap buffer overflow attempt RuleID : 37676 - Revision : 2 - Type : SERVER-OTHER |
2016-03-14 | Cisco IOS invalid IKE fragment length memory corruption or exhaustion attempt RuleID : 37675 - Revision : 3 - Type : SERVER-OTHER |
2016-03-15 | Cisco ASA IKEv1 invalid fragment length heap buffer overflow attempt RuleID : 37674 - Revision : 2 - Type : SERVER-OTHER |
2016-03-14 | Cisco ASA IKEv2 invalid fragment length heap buffer overflow attempt RuleID : 36903 - Revision : 3 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-02-29 | Name : The remote device is missing a vendor-supplied security patch. File : cisco_ike_fragmentation_rce.nasl - Type : ACT_ATTACK |
2016-02-12 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20160210-asa-ike.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-03-17 21:30:24 |
|
2016-03-01 13:26:32 |
|
2016-02-16 21:29:39 |
|
2016-02-16 21:24:27 |
|
2016-02-13 13:27:47 |
|
2016-02-11 21:29:33 |
|
2016-02-11 21:23:56 |
|