Executive Summary

Title Cisco Firepower System Software Detection Engine Denial of Service Vulnerability
Name cisco-sa-20181003-fp-smb-snort First vendor Publication 2018-10-03
Vendor Cisco Last vendor Modification 2018-10-03
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A vulnerability in the Server Message Block Version 2 (SMBv2) and Version 3 (SMBv3) protocol implementation for the Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the device to run low on system memory, possibly preventing the device from forwarding traffic. It is also possible that a manual reload of the device may be required to clear the condition.

The vulnerability is due to incorrect SMB header validation. An attacker could exploit this vulnerability by sending a custom SMB file transfer through the targeted device. A successful exploit could cause the device to consume an excessive amount of system memory and prevent the SNORT process from forwarding network traffic. This vulnerability can be exploited using either IPv4 or IPv6 in combination with SMBv2 or SMBv3 network traffic.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-smb-snort ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-smb-snort"]


iQJ5BAEBAgBjBQJbtOqcXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczGNgP/RfADpCaKEl+0/2OovPlqp6oljqF LV1rGunRmuJT1RR3j7w6AIkqTC8UpquepGS2PKxhNG/m0qrw05jWQHQ0XeQaxKU/ PVWVLaC/sQ7QJJKqQXrV75PPc1Qn358cjVDhqiix8FsPcPZdtHf4sBqS+esZzK3p TOB/6aGPSsWj9kLehXviB6SC80qq+9uNp7PfNB/mrZxEIKOtGV4QScC7s/rYbGrY avohfcRbEhT3lpmwndq7hPVyluCCFg/fQIHRDh76dcZT/PX5VGBFTf/+HNYaj7g6 I3p6I4pwBlg9p2KbIvcM9hMyBBCej0CD5JXJRuSnJmtX/LTc5ofg1pf50k5XM1ou kRR2PoJMBjlovR/VBh90Off66w/y5OXnqJBjRl+Vn2c7It1x7pPLAESLr2q4N/sz wQx6zlysn2Zwbtu5jcSToRpFFbjaW00419hQZM1e6tadfeiXf9IQ8zWCcJ4AuNW4 3oEVC9Ve99zVb1K4930jssKxEyrCPGQKKloW5KAUvp9lfIVHQshkNXcwxNNoOL6l PDGWSK6Kp9rSLVkjX2+TF7FNYz2o0x5zw8wZ2VTD7Tsb1NVgQ4bxzhs3TE1bWi4B HaHcyUCSrlO9sxmnYXFHTc0K3QApB0y7Axuw8ruhCmoYSOI7kbAWOuE2D5b1j7N3 eMZZ1T7v0z6dHyWE =p0Qa END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CPE : Common Platform Enumeration

Application 8

Alert History

If you want to see full details history, please login or register.
Date Informations
2019-01-10 17:21:20
  • Multiple Updates
2018-10-05 21:21:50
  • Multiple Updates
2018-10-03 21:18:53
  • First insertion