This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2011-10-06
Product Firewall Services Module Software Last view 2014-02-22
Version 4.1(2) Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:cisco:firewall_services_module_software

Activity : Overall

Related : CVE

  Date Alert Description
7.1 2014-02-22 CVE-2014-0710

Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824.

7.1 2013-10-13 CVE-2013-5508

The SQL*Net inspection engine in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.6), 9.0.x before 9.0(2.10), and 9.1.x before 9.1(2) and Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(27) and 4.x before 4.1(14) allows remote attackers to cause a denial of service (device reload) via crafted segmented Transparent Network Substrate (TNS) packets, aka Bug ID CSCub98434.

6.6 2013-10-13 CVE-2013-5506

The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context's configuration via unspecified commands, aka Bug ID CSCue46080.

7.8 2013-04-11 CVE-2013-1155

The auth-proxy functionality in Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(20.1), 4.0 before 4.0(15.2), and 4.1 before 4.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted URL, aka Bug ID CSCtg02624.

7.8 2013-04-11 CVE-2013-1149

Cisco Adaptive Security Appliances (ASA) devices with software 7.x before 7.2(5.10), 8.0 before 8.0(5.28), 8.1 and 8.2 before 8.2(5.35), 8.3 before 8.3(2.34), 8.4 before 8.4(4.11), 8.6 before 8.6(1.10), and 8.7 before 8.7(1.3), and Cisco Firewall Services Module (FWSM) software 3.1 and 3.2 before 3.2(24.1) and 4.0 and 4.1 before 4.1(11.1), allow remote attackers to cause a denial of service (device reload) via a crafted IKEv1 message, aka Bug IDs CSCub85692 and CSCud20267.

7.8 2012-03-14 CVE-2012-0356

Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services Module (ASASM) in Cisco Catalyst 6500 series devices, with software 7.0 through 7.2 before 7.2(5.7), 8.0 before 8.0(5.27), 8.1 before 8.1(2.53), 8.2 before 8.2(5.8), 8.3 before 8.3(2.25), 8.4 before 8.4(2.5), and 8.5 before 8.5(1.2) and the Firewall Services Module (FWSM) 3.1 and 3.2 before 3.2(23) and 4.0 and 4.1 before 4.1(8) in Cisco Catalyst 6500 series devices, when multicast routing is enabled, allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367.

7.8 2011-10-06 CVE-2011-3303

Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 before 8.1(2.50), 8.2 before 8.2(5.6), 8.3 before 8.3(2.23), 8.4 before 8.4(2.7), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via malformed ILS traffic, aka Bug IDs CSCtq57697 and CSCtq57802.

7.8 2011-10-06 CVE-2011-3302

Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92398 and CSCtq09989.

7.8 2011-10-06 CVE-2011-3301

Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06062 and CSCtq09986.

7.8 2011-10-06 CVE-2011-3300

Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCtq06065 and CSCtq09978.

7.8 2011-10-06 CVE-2011-3299

Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.4), 8.0 before 8.0(5.25), 8.1 and 8.2 before 8.2(5.11), 8.3 before 8.3(2.23), 8.4 before 8.4(2.6), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to cause a denial of service (device reload) via crafted SunRPC traffic, aka Bug IDs CSCto92380 and CSCtq09972.

7.9 2011-10-06 CVE-2011-3298

Cisco Adaptive Security Appliances (ASA) 5500 series devices, and the ASA Services module in Cisco Catalyst 6500 series devices, with software 7.0 before 7.0(8.13), 7.1 and 7.2 before 7.2(5.3), 8.0 before 8.0(5.24), 8.1 before 8.1(2.50), 8.2 before 8.2(5), 8.3 before 8.3(2.18), 8.4 before 8.4(1.10), and 8.5 before 8.5(1.1) and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7) allow remote attackers to bypass authentication via a crafted TACACS+ reply, aka Bug IDs CSCto40365 and CSCto74274.

7.8 2011-10-06 CVE-2011-3297

Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.

7.8 2011-10-06 CVE-2011-3296

Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when IPv6 is used, allows remote attackers to cause a denial of service (memory corruption and module crash or hang) via vectors that trigger syslog message 302015, aka Bug ID CSCti83875.

CWE : Common Weakness Enumeration

%idName
46% (6) CWE-399 Resource Management Errors
23% (3) CWE-287 Improper Authentication
15% (2) CWE-20 Improper Input Validation
7% (1) CWE-362 Race Condition
7% (1) CWE-264 Permissions, Privileges, and Access Controls

Open Source Vulnerability Database (OSVDB)

id Description
76090 Cisco Multiple Product ILS Message Packet Parsing Remote DoS
76089 Cisco Multiple Product SunRPC Message Packet Parsing Remote DoS (2011-3302)
76088 Cisco Multiple Product SunRPC Message Packet Parsing Remote DoS (2011-3301)
76087 Cisco Multiple Product SunRPC Message Packet Parsing Remote DoS (2011-3300)
76086 Cisco Multiple Product SunRPC Message Packet Parsing Remote DoS (2011-3299)
76085 Cisco Multiple Product TACACS+ Reply Parsing Authentication Bypass
76084 Cisco Firewall Services Module (FWSM) Authentication Request Saturation Remot...
76083 Cisco Firewall Services Module (FWSM) IPv6 Syslog Message 302015 Log Generati...

Information Assurance Vulnerability Management (IAVM)

id Description
2014-A-0031 Cisco Firewall Services Module (FWSM) Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0044549
2013-A-0192 Multiple Vulnerabilities in Cisco ASA
Severity: Category I - VMSKEY: V0040780
2013-A-0193 Multiple Vulnerabilities in Cisco Firewall Services Module (FWSM)
Severity: Category I - VMSKEY: V0040790

Snort® IPS/IDS

Date Description
2014-11-16 Cisco ASA SQLNet inspection engine denial of service attempt
RuleID : 31667 - Type : SERVER-OTHER - Revision : 3
2014-11-16 Cisco ASA SQLNet inspection engine denial of service attempt
RuleID : 31666 - Type : SERVER-OTHER - Revision : 3
2014-11-16 Cisco ASA SQLNet inspection engine denial of service attempt
RuleID : 31665 - Type : SERVER-OTHER - Revision : 3
2014-11-16 Cisco ASA SQLNet inspection engine denial of service attempt
RuleID : 31664 - Type : SERVER-OTHER - Revision : 3

Nessus® Vulnerability Scanner

id Description
2014-02-24 Name: The remote device is missing a vendor-supplied security update.
File: cisco-sa-20140219-fwsm.nasl - Type: ACT_GATHER_INFO
2013-10-18 Name: The remote device is missing a vendor-supplied security update.
File: cisco-sa-20131009-fwsm.nasl - Type: ACT_GATHER_INFO
2013-10-17 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20131009-asa.nasl - Type: ACT_GATHER_INFO
2013-09-17 Name: The remote device is missing a vendor-supplied security update.
File: cisco-sa-20130410-fwsm.nasl - Type: ACT_GATHER_INFO
2013-04-11 Name: The remote security device is missing a vendor-supplied security patch.
File: cisco-sa-20130410-asa.nasl - Type: ACT_GATHER_INFO
2012-04-23 Name: The remote security device is missing a vendor-supplied security patch.
File: cisco-sa-20120314-asa.nasl - Type: ACT_GATHER_INFO
2011-10-25 Name: The remote security device is missing a vendor-supplied security patch.
File: cisco-sa-20111005-asa.nasl - Type: ACT_GATHER_INFO