lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <201510211243.6.asa@psirt.cisco.com>
Date: Wed, 21 Oct 2015 12:43:05 -0400
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Cisco ASA Software DNS Denial of Service Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco ASA Software DNS Denial of Service Vulnerability

Advisory ID: cisco-sa-20151021-asa-dns1

Revision 1.0

For Public Release 2015 October 21 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected system to reload.

The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending a request to an affected Cisco ASA appliance to cause it to generate a DNS request packet. The attacker would need to spoof the reply packet with a crafted DNS response.


Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns1


-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - https://gpgtools.org
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=ugAt
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ