Executive Summary
Summary | |
---|---|
Title | Cisco Firepower Detection Engine Pragmatic General Multicast Protocol Decoding Denial of Service Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20170419-fpsnort | First vendor Publication | 2017-04-19 |
Vendor | Cisco | Last vendor Modification | 2017-04-19 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort"] BEGIN PGP SIGNATURE iQKBBAEBAgBrBQJY94y8ZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHlAjhAA0O9xAPu90t6MBSz2 9iT7Te4JvTN3Q0HutNiI/VmZu/ya/G1Wn+7FiwfEyrCAw1yQ2NrEFpNkehWhXqFg k3ANtAtAJGl2xjwF4oJ3QtusW+fzNL5nJ8iW+HZ5RbOABqDWDwmRHR6rkKnp/sym HSJ6gVtsbftXpYobjU1rjNsjTELTcOigsPQe23sEluHtGXEfY1BvtHJNhMrd6Dc3 hGEl2sKeZFBcCj+CbsuftvwvnQksV8iiNwRkx//7KN7bRldDak1ZM3Ecp3xC4jsE /Dy0QXbn3PwJkK10G6I3qjf0A0CI3X6GeaCaUOALMWE3n27ae333UKAgHr/CcllU mJFV+pA2+PrVQItOSTDuJOg9wmNXwe1WWJUMaJ4oDfZa1wcSPrF9D615eZA0JFL6 ZHlfXwENm5TrL/bs7sxjYGB//57/NUh2+z3GBP4ophpbQZ0Fw1ZHMyqmi9P+Z/GK wc3YK/YrMGs7BlshpJUZF1yJMmGk30cmoNRYEINr4kTTmMs70S7Xw1kVyyWzteuU JBhRdU+0MJUgI7on3tJao7ymrME+AvmGz6PgDBzI/talNpckjb+Mr+kjdz3fhWhz AxoucSIacjoLl5JUQSRdFvzC8qWhzRd2CpHqNp9rRkd54UksM2a4pVNY5aRJq6/x QgLmvKOVeWKN6Qo0tnvijnLf+rQ= =Ff/9 END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-05-25 | Name : The packet inspection software installed on the remote host is affected by a ... File : cisco-sa-20170419-fpsnort.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-05-27 13:25:58 |
|
2017-04-28 21:25:04 |
|
2017-04-21 05:24:01 |
|
2017-04-19 21:22:49 |
|