lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 11 Mar 2015 12:28:11 -0400
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Cisco Intrusion Prevention System MainApp Secure Socket Layer Denial of Service Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco Intrusion Prevention System MainApp Secure Socket Layer Denial of Service Vulnerability

Advisory ID: cisco-sa-20150311-ips

Revision 1.0

For Public Release 2015 March 11 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

The Cisco Intrusion Prevention System (IPS) Software has a vulnerability within the SSL/TLS subsystem utilized by the web management interface which could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

Cisco has released free software updates that address this vulnerability. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-ips
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org

iQIcBAEBCgAGBQJVAGihAAoJEIpI1I6i1Mx3PCYP/j5Ej14GymDq0dvsDWmnLYlO
JAmJmrSV+r1vWHmj0YcVLVGyXGbmBYnHxZHNCgyB+RKC67jdmoE0zCL5bi69dEFr
ee+L/o8/f22NXcbATdJCb8vdjgW6/3cnKiODyDoEtM7MuDmH/h7eml/I3dDQBfES
oKMTNb+bxVi8ojVNBDa8ml9+Xp6ppuJzDIUm/eq8tAMQXncFMfsQehYCq9GRGN8Z
Rt5N309+C8vcVp5jHP06vcG5xH/sript/zY49nW/TYoC57EMHq3/c0h13mrbCRlO
wIf8Kr+YET1p7++hMzbWq6SLlz0Np5oG3B3zN1UvJ1ABiJ8y3xnV5MrC7iUU17R4
mEQCCJSvvKV32DguKWJ3H/xfZr5uiPPgyXuMw4rPwPBjUJyOYuxArn5q+OXo4JLM
F2oqIgTkm0zHYtEoEwH51KH6X9N2QrssUMomxBsSOs4LwnNcKB2Fyq0HQpX492PL
Pp6DKkOV24HLh5AHwrwKHArmLUIfGejBgyUrjbCt/eT4cutKhwrQhunEnis6jzYj
fTyLmQ5cZjIhT4+8akurpze1fNCTLFd2FVexvbRxNro2iL30LdFDHDUpz/9xsqks
A+ONgWGeKMKnCjawZ9s2OPgNV7WEvibjFiDWHdH7xZM8YpwR/5381OQNwCsdKdvW
alelR0tXSuOXiO6EN9ha
=kotf
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ