S-096: Application Inspection Vulnerability in Cisco Firewall Services Module


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-096: Application Inspection Vulnerability in Cisco Firewall Services Module
# 1  
Old 12-24-2007
S-096: Application Inspection Vulnerability in Cisco Firewall Services Module

A vulnerability exists in the Cisco Firewall Services Module (FWSM) - a high-speed, integrated firewall module for Cisco Catalyst 6500 switches and Cisco 7600 Series routers, that my result in a reload of the FWSM. The risk is LOW. May result in a reload of the FWSM.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. IP Networking

How to show Cisco Router Running Configuration in Third Party Application

Hey everyone, I have a few question. 1. Is it possible to display cisco 'show run' output command to the application ?? 2. And is there any ways to log in to the router instead of using telnet from telnet application??? Thanks in advance (0 Replies)
Discussion started by: franzramadhan
0 Replies

2. IP Networking

cisco switch + firewall configuration upgrade

Hi experts, I need to cope configuration from one switch/firewall to another switch/firewall. I have copied running configs. The question is do I have to clear the existing configuration on the dest. devices Or can I copy it(replace) directly without clearing previous config ? If... (2 Replies)
Discussion started by: hernand
2 Replies

3. Shell Programming and Scripting

Perl variables inside Net::Telnet::Cisco Module doesn't work

I am writing perl script to configure Cisco device but Variables inside Net::Telnet::Cisco Module doesn't work and passed to device without resolving. Please advise. here is a sample of script: use Net::Telnet::Cisco; $device = "10.14.199.1"; ($o1, $o2, $o3, $o4) = split(/\./,$device);... (5 Replies)
Discussion started by: ahmed_zaher
5 Replies
Login or Register to Ask a Question
Firewall(3pm)						  LogReport's Lire Documentation					     Firewall(3pm)

NAME
Lire::Firewall - supplies a subroutine enabling TCP and UDP portnumber-to-name mapping SYNOPSIS
use Lire::Firewall qw/:firewall_number2names /; DESCRIPTION
The Lire::Firewall::firewall_number2names converts numbers for network services, as commonly found in firewall log files, to their descriptive names. firewall_revolve FIXME TODO It takes a firewall Lire dlf object as argument, and operates on its to_port, from_port and protocol properties. TCP services, UDP services and ICMP types are supported. SEE ALSO
RPC 792 for ICMP types. VERSION
$Id: Firewall.pm,v 1.5 2006/07/23 13:16:27 vanbaal Exp $ COPYRIGHT
Copyright (C) 2000, 2001, 2002 Stichting LogReport Foundation LogReport@LogReport.org This file is part of Lire. Lire is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program (see COPYING); if not, check with http://www.gnu.org/copyleft/gpl.html. AUTHOR
Francis J. Lacoste <flacoste@logreport.org>. The first Lire implementation of a TCP and UDP portnumber-to-name mapping was written by Plamen Bozukov. Lire 2.1.1 2006-07-23 Firewall(3pm)