Executive Summary

Title Cisco Firepower Detection Engine Pragmatic General Multicast Protocol Decoding Denial of Service Vulnerability
Name cisco-sa-20170419-fpsnort First vendor Publication 2017-04-19
Vendor Cisco Last vendor Modification 2017-04-19
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting.

The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort"]


iQKBBAEBAgBrBQJY94y8ZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHlAjhAA0O9xAPu90t6MBSz2 9iT7Te4JvTN3Q0HutNiI/VmZu/ya/G1Wn+7FiwfEyrCAw1yQ2NrEFpNkehWhXqFg k3ANtAtAJGl2xjwF4oJ3QtusW+fzNL5nJ8iW+HZ5RbOABqDWDwmRHR6rkKnp/sym HSJ6gVtsbftXpYobjU1rjNsjTELTcOigsPQe23sEluHtGXEfY1BvtHJNhMrd6Dc3 hGEl2sKeZFBcCj+CbsuftvwvnQksV8iiNwRkx//7KN7bRldDak1ZM3Ecp3xC4jsE /Dy0QXbn3PwJkK10G6I3qjf0A0CI3X6GeaCaUOALMWE3n27ae333UKAgHr/CcllU mJFV+pA2+PrVQItOSTDuJOg9wmNXwe1WWJUMaJ4oDfZa1wcSPrF9D615eZA0JFL6 ZHlfXwENm5TrL/bs7sxjYGB//57/NUh2+z3GBP4ophpbQZ0Fw1ZHMyqmi9P+Z/GK wc3YK/YrMGs7BlshpJUZF1yJMmGk30cmoNRYEINr4kTTmMs70S7Xw1kVyyWzteuU JBhRdU+0MJUgI7on3tJao7ymrME+AvmGz6PgDBzI/talNpckjb+Mr+kjdz3fhWhz AxoucSIacjoLl5JUQSRdFvzC8qWhzRd2CpHqNp9rRkd54UksM2a4pVNY5aRJq6/x QgLmvKOVeWKN6Qo0tnvijnLf+rQ= =Ff/9 END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

CPE : Common Platform Enumeration

Application 4

Nessus® Vulnerability Scanner

Date Description
2017-05-25 Name : The packet inspection software installed on the remote host is affected by a ...
File : cisco-sa-20170419-fpsnort.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2017-05-27 13:25:58
  • Multiple Updates
2017-04-28 21:25:04
  • Multiple Updates
2017-04-21 05:24:01
  • Multiple Updates
2017-04-19 21:22:49
  • First insertion