S-144: Cisco PIX and ASA Time-to-Live Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-144: Cisco PIX and ASA Time-to-Live Vulnerability
# 1  
Old 01-30-2008
S-144: Cisco PIX and ASA Time-to-Live Vulnerability

A crafted IP packet vulnerability exists in the Cisco PIX 500 Series Security Appliance (PIX) and the Cisco 5500 Series Adaptive Security Appliance (ASA) that may result in a reload of the device. The risk is LOW. May result in a reload of the device. This vulnerability is triggered during processing of a crafted IP packet when the Time-to-Live (TTL) decrement feature is enabled.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. IP Networking

Openswan with Cisco ASA

Hi all, I need this as soon as possible to solve it or at least to find out what is the problem. I have configured IPSec tunnels with Openswan and Cisco ASA, i have established a connection and the ping was fine, but after some time there is request time out from both sites. I don't have ASA... (0 Replies)
Discussion started by: ivancd
0 Replies

2. IP Networking

Cisco 3750 Switch ASA VPN Routing

Hi,I want connect my ASA 5510 firewall to a 3750 switch with RIP routing. Unfortunately,I am having issues passing the VPN subnet through rip to the 3750.I don't understand how the routing table is populated on the ASA. Any suggestions? (0 Replies)
Discussion started by: Ayaerlee
0 Replies

3. IP Networking

How to establish site to site vpn - Linux machine and cisco asa?

Hi, I am trying to establish vpn between my linux server and cisco asa at client side. I installed openswan on my cent os. Linux Server eth0 - 182.2.29.10 Gateway - 182.2.29.1 eth1 - 192.9.200.75 I have simple IPtables Like WAN="eth0" LAN="eth1" (0 Replies)
Discussion started by: ashokvpp
0 Replies

4. Solaris

Connecting Solaris 10 to Cisco PIX with IPsec tunnel

I having problem connecting to a Cisco PIX Log from IKE # /usr/lib/inet/in.iked -f /etc/inet/ike/config -d Jan 16 00:40:57: 2012 (+0800) *** in.iked started *** Jan 16 00:40:57: Loading configuration... Jan 16 00:40:57: Checking lifetimes in "nullrule" Jan 16 00:40:57: Using default value... (0 Replies)
Discussion started by: conandor
0 Replies
Login or Register to Ask a Question
Info::Layer2::Cisco(3pm)				User Contributed Perl Documentation				  Info::Layer2::Cisco(3pm)

NAME
SNMP::Info::Layer2::Cisco - SNMP Interface to L3 and L2+L3 IOS Cisco Device that are not covered in other classes. AUTHOR
Max Baker SYNOPSIS
# Let SNMP::Info determine the correct subclass for you. my $cisco = new SNMP::Info( AutoSpecify => 1, Debug => 1, # These arguments are passed directly to SNMP::Session DestHost => 'myswitch', Community => 'public', Version => 2 ) or die "Can't connect to DestHost. "; my $class = $cisco->class(); print "SNMP::Info determined this device to fall under subclass : $class "; DESCRIPTION
Subclass for Generic Cisco Routers running IOS Inherited Classes SNMP::Info::CiscoVTP SNMP::Info::CDP SNMP::Info::CiscoStats SNMP::Info::CiscoImage SNMP::Info::CiscoRTT SNMP::Info::CiscoQOS SNMP::Info::CiscoConfig SNMP::Info::Layer2 Required MIBs Inherited Classes' MIBs See "Required MIBs" in SNMP::Info::CiscoVTP for its own MIB requirements. See "Required MIBs" in SNMP::Info::CiscoStats for its own MIB requirements. See "Required MIBs" in SNMP::Info::CDP for its own MIB requirements. See "Required MIBs" in SNMP::Info::CiscoImage for its own MIB requirements. See "Required MIBs" in SNMP::Info::CiscoRTT for its own MIB requirements. See "Required MIBs" in SNMP::Info::CiscoQOS for its own MIB requirements. See "Required MIBs" in SNMP::Info::CiscoConfig for its own MIB requirements. See "Required MIBs" in SNMP::Info::Layer2 for its own MIB requirements. GLOBALS
These are methods that return scalar value from SNMP $cisco->vendor() Returns 'cisco' Global Methods imported from SNMP::Info::CiscoVTP See documentation in "GLOBALS" in SNMP::Info::CiscoVTP for details. Globals imported from SNMP::Info::CDP See documentation in "GLOBALS" in SNMP::Info::CDP for details. Globals imported from SNMP::Info::CiscoStats See documentation in "GLOBALS" in SNMP::Info::CiscoStats for details. Globals imported from SNMP::Info::CiscoImage See documentation in "GLOBALS" in SNMP::Info::CiscoImage for details. Globals imported from SNMP::Info::CiscoRTT See documentation in "GLOBALS" in SNMP::Info::CiscoRTT for details. Globals imported from SNMP::Info::CiscoQOS See documentation in "GLOBALS" in SNMP::Info::CiscoQOS for details. Globals imported from SNMP::Info::CiscoConfig See documentation in "GLOBALS" in SNMP::Info::CiscoConfig for details. Globals imported from SNMP::Info::Layer2 See documentation in "GLOBALS" in SNMP::Info::Layer2 for details. TABLE METHODS
These are methods that return tables of information in the form of a reference to a hash. Table Methods imported from SNMP::Info::CiscoVTP See documentation in "TABLE METHODS" in SNMP::Info::CiscoVTP for details. Table Methods imported from SNMP::Info::CDP See documentation in "TABLE METHODS" in SNMP::Info::CDP for details. Table Methods imported from SNMP::Info::CiscoStats See documentation in "TABLE METHODS" in SNMP::Info::CiscoStats for details. Table Methods imported from SNMP::Info::CiscoImage See documentation in "TABLE METHODS" in SNMP::Info::CiscoImage for details. Table Methods imported from SNMP::Info::CiscoRTT See documentation in "TABLE METHODS" in SNMP::Info::CiscoRTT for details. Table Methods imported from SNMP::Info::CiscoQOS See documentation in "TABLE METHODS" in SNMP::Info::CiscoQOS for details. Table Methods imported from SNMP::Info::CiscoConfig See documentation in "TABLE METHODS" in SNMP::Info::CiscoConfig for details. Table Methods imported from SNMP::Info::Layer2 See documentation in "TABLE METHODS" in SNMP::Info::Layer2 for details. perl v5.12.4 2011-09-28 Info::Layer2::Cisco(3pm)