lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 19 Feb 2016 18:41:35 +0000
From: "Mark-David McLaughlin (marmclau)" <marmclau@...co.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: Re: [FD] Cisco ASA VPN - Zero Day Exploit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

This is message serves as Cisco PSIRT's response to Juan Sacco’s post on 
Febuary 17 regarding a zero-day exploit on the Cisco ASA. 

We would like to thank Juan for reporting these issues to Cisco a couple of weeks ago.
We greatly appreciate the opportunity to work with researchers on security
vulnerabilities and welcome the opportunity to review and assist in product reports.

Juan’s original post is available in the Full Disclosure archives at:
http://seclists.org/fulldisclosure/2016/Feb/82 
	
Cisco confirms there is a cross site scripting vulnerability in the webVPN interface of
ASA’s running software versions prior to 8.4(7) and 9.1(3).

We have verified this issue was published as CVE-2014-2120 and more information is
available in cisco bug ID: CSCun19025 (available at:
https://tools.cisco.com/bugsearch/bug/CSCun19025.)

Cisco previously published a security notice on this vulnerability which is available at:
https://tools.cisco.com/security/center/viewAlert.x?alertId=33406.
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org

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=mMMo
-----END PGP SIGNATURE-----



Download attachment "smime.p7s" of type "application/pkcs7-signature" (4963 bytes)


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ