Executive Summary

Summary
Title Cisco PIX and ASA Time-to-Live Vulnerability
Informations
Name cisco-sa-20080123-asa First vendor Publication 2007-12-04
Vendor Cisco Last vendor Modification 2008-01-23
Severity (Vendor) N/A Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.1 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A crafted IP packet vulnerability exists in the Cisco PIX 500 Series Security Appliance (PIX) and the Cisco 5500 Series Adaptive Security Appliance (ASA) that may result in a reload of the device. This vulnerability is triggered during processing of a crafted IP packet when the Time-to-Live (TTL) decrement feature is enabled.

Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0028 has been assigned to this vulnerability.

Cisco has released free software updates that address this vulnerability. A workaround that mitigates this vulnerability is available.

Original Source

Url : http://www.cisco.com/en/US/products/products_security_advisory09186a008093 (...)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 33
Os 138
Os 65

Open Source Vulnerability Database (OSVDB)

Id Description
40640 Cisco PIX / ASA Crafted IP Packet Time-To-Live DoS