T-023: Multiple Vulnerabilities in Cisco PIX and Cisco ASA


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) T-023: Multiple Vulnerabilities in Cisco PIX and Cisco ASA
# 1  
Old 11-13-2008
T-023: Multiple Vulnerabilities in Cisco PIX and Cisco ASA

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances: 1) Windows NT domain authentication bypass; 2) IPv6 Denial of Service; and 3) Crypto Accelerator memory leak. NOTE: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another. The risk is MEDIUM. A remote intruder could make a VPN connection to a network without needing to authenticate.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. IP Networking

Openswan with Cisco ASA

Hi all, I need this as soon as possible to solve it or at least to find out what is the problem. I have configured IPSec tunnels with Openswan and Cisco ASA, i have established a connection and the ping was fine, but after some time there is request time out from both sites. I don't have ASA... (0 Replies)
Discussion started by: ivancd
0 Replies

2. IP Networking

Cisco 3750 Switch ASA VPN Routing

Hi,I want connect my ASA 5510 firewall to a 3750 switch with RIP routing. Unfortunately,I am having issues passing the VPN subnet through rip to the 3750.I don't understand how the routing table is populated on the ASA. Any suggestions? (0 Replies)
Discussion started by: Ayaerlee
0 Replies

3. IP Networking

How to establish site to site vpn - Linux machine and cisco asa?

Hi, I am trying to establish vpn between my linux server and cisco asa at client side. I installed openswan on my cent os. Linux Server eth0 - 182.2.29.10 Gateway - 182.2.29.1 eth1 - 192.9.200.75 I have simple IPtables Like WAN="eth0" LAN="eth1" (0 Replies)
Discussion started by: ashokvpp
0 Replies

4. Solaris

Connecting Solaris 10 to Cisco PIX with IPsec tunnel

I having problem connecting to a Cisco PIX Log from IKE # /usr/lib/inet/in.iked -f /etc/inet/ike/config -d Jan 16 00:40:57: 2012 (+0800) *** in.iked started *** Jan 16 00:40:57: Loading configuration... Jan 16 00:40:57: Checking lifetimes in "nullrule" Jan 16 00:40:57: Using default value... (0 Replies)
Discussion started by: conandor
0 Replies
Login or Register to Ask a Question
NG_CISCO(4)                                                BSD Kernel Interfaces Manual                                                NG_CISCO(4)

NAME
ng_cisco -- Cisco HDLC protocol netgraph node type SYNOPSIS
#include <sys/types.h> #include <netinet/in.h> #include <netgraph/ng_cisco.h> DESCRIPTION
The cisco node type performs encapsulation and de-encapsulation of packets using the Cisco HDLC protocol. This is a fairly simple protocol for the transmission of packets across high speed synchronous lines. Each packet is prepended with an Ethertype, indicating the protocol. There is also a ``keep alive'' and an ``inquire'' capability. The downstream hook should connect to the synchronous line. On the other side of the node are the inet, inet6, atalk, and ipx hooks, which transmit and receive raw IP, IPv6, AppleTalk, and IPX packets, respectively. Typically these hooks would connect to the corresponding hooks on an ng_iface(4) type node. IP Configuration In order to function properly for IP traffic, the node must be informed of the local IP address and netmask setting. This is because the protocol includes an ``inquire'' packet which we must be prepared to answer. There are two ways to accomplish this, manually and automati- cally. Whenever such an inquire packet is received, the node sends a NGM_CISCO_GET_IPADDR control message to the peer node connected to the inet hook (if any). If the peer responds, then that response is used. This is the automatic method. If the peer does not respond, the node falls back on its cached value for the IP address and netmask. This cached value can be set at any time with a NGM_CISCO_SET_IPADDR message, and this is the manual method. If the inet hook is connected to the inet hook of an ng_iface(4) node, as is usually the case, then configuration is automatic as the ng_iface(4) understands the NGM_CISCO_GET_IPADDR message. HOOKS
This node type supports the following hooks: downstream The connection to the synchronous line. inet IP hook. inet6 IPv6 hook. atalk AppleTalk hook. ipx IPX hook CONTROL MESSAGES
This node type supports the generic control messages, plus the following: NGM_CISCO_SET_IPADDR This command takes an array of two struct in_addr arguments. The first is the IP address of the corresponding interface and the second is the netmask. NGM_CISCO_GET_IPADDR This command returns the IP configuration in the same format used by NGM_CISCO_SET_IPADDR. This command is also sent by this node type to the inet peer whenever an IP address inquiry packet is received. NGM_CISCO_GET_STATUS Returns a struct ngciscostat: struct ngciscostat { u_int32_t seq_retries; /* # unack'd retries */ u_int32_t keepalive_period; /* in seconds */ }; SHUTDOWN
This node shuts down upon receipt of a NGM_SHUTDOWN control message, or when all hooks have been disconnected. SEE ALSO
netgraph(4), ng_iface(4), ngctl(8) D. Perkins, Requirements for an Internet Standard Point-to-Point Protocol, RFC 1547. LEGAL
Cisco is a trademark of Cisco Systems, Inc. HISTORY
The ng_cisco node type was implemented in FreeBSD 4.0. AUTHORS
Julian Elischer <julian@FreeBSD.org>, Archie Cobbs <archie@FreeBSD.org> BUGS
Not all of the functionality has been implemented. For example, the node does not support querying the remote end for its IP address and netmask. BSD January 19, 1999 BSD