Executive Summary
Summary | |
---|---|
Title | Application Inspection Vulnerability in Cisco Firewall Services Module |
Informations | |||
---|---|---|---|
Name | cisco-sa-20071219-fwsm | First vendor Publication | 2007-12-13 |
Vendor | Cisco | Last vendor Modification | 2007-12-19 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability exists in the Cisco Firewall Services Module (FWSM) - - - a high-speed, integrated firewall module for Cisco Catalyst 6500 switches and Cisco 7600 Series routers, that may result in a reload of the FWSM. The only affected FWSM System Software Version is 3.2(3). There are no known instances of intentional exploitation of this issue. However, Cisco has observed data streams that appear to be unintentionally triggering this vulnerability. Common Vulnerabilities and Exposures (CVE) identifier CVE-2007-5584 has been assigned to this vulnerability. Cisco will release free software updates that address this vulnerability. A workaround that mitigates this vulnerability is available. |
Original Source
Url : http://www.cisco.com/en/US/products/products_security_advisory09186a008091 (...) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Hardware | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
39298 | Cisco Firewall Services Module (FWSM) Unspecified Remote DoS Cisco Firewall Services Module (FWSM) contains a flaw that may allow a remote denial of service. The issue is triggered when certain unspecified standard network traffic is processed by the layer 7 application inspection engine, and will result in loss of availability for the system. |