T-023: Multiple Vulnerabilities in Cisco PIX and Cisco ASA


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) T-023: Multiple Vulnerabilities in Cisco PIX and Cisco ASA
# 1  
Old 11-13-2008
T-023: Multiple Vulnerabilities in Cisco PIX and Cisco ASA

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances: 1) Windows NT domain authentication bypass; 2) IPv6 Denial of Service; and 3) Crypto Accelerator memory leak. NOTE: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another. The risk is MEDIUM. A remote intruder could make a VPN connection to a network without needing to authenticate.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. IP Networking

Openswan with Cisco ASA

Hi all, I need this as soon as possible to solve it or at least to find out what is the problem. I have configured IPSec tunnels with Openswan and Cisco ASA, i have established a connection and the ping was fine, but after some time there is request time out from both sites. I don't have ASA... (0 Replies)
Discussion started by: ivancd
0 Replies

2. IP Networking

Cisco 3750 Switch ASA VPN Routing

Hi,I want connect my ASA 5510 firewall to a 3750 switch with RIP routing. Unfortunately,I am having issues passing the VPN subnet through rip to the 3750.I don't understand how the routing table is populated on the ASA. Any suggestions? (0 Replies)
Discussion started by: Ayaerlee
0 Replies

3. IP Networking

How to establish site to site vpn - Linux machine and cisco asa?

Hi, I am trying to establish vpn between my linux server and cisco asa at client side. I installed openswan on my cent os. Linux Server eth0 - 182.2.29.10 Gateway - 182.2.29.1 eth1 - 192.9.200.75 I have simple IPtables Like WAN="eth0" LAN="eth1" (0 Replies)
Discussion started by: ashokvpp
0 Replies

4. Solaris

Connecting Solaris 10 to Cisco PIX with IPsec tunnel

I having problem connecting to a Cisco PIX Log from IKE # /usr/lib/inet/in.iked -f /etc/inet/ike/config -d Jan 16 00:40:57: 2012 (+0800) *** in.iked started *** Jan 16 00:40:57: Loading configuration... Jan 16 00:40:57: Checking lifetimes in "nullrule" Jan 16 00:40:57: Using default value... (0 Replies)
Discussion started by: conandor
0 Replies
Login or Register to Ask a Question
Info::Layer3::CiscoFWSM(3pm)				User Contributed Perl Documentation			      Info::Layer3::CiscoFWSM(3pm)

NAME
SNMP::Info::Layer3::CiscoFWSM - SNMP Interface to Firewall Services Modules for features not covered elsewhere. AUTHOR
Brian De Wolf SYNOPSIS
# Let SNMP::Info determine the correct subclass for you. my $fwsm = new SNMP::Info( AutoSpecify => 1, Debug => 1, # These arguments are passed directly to SNMP::Session DestHost => 'myswitch', Community => 'public', Version => 2 ) or die "Can't connect to DestHost. "; my $class = $fwsm->class(); print "SNMP::Info determined this device to fall under subclass : $class "; DESCRIPTION
Subclass for Cisco Firewall Services Modules Inherited Classes SNMP::Info::Layer3::Cisco Required MIBs Inherited Classes' MIBs See "Required MIBs" in SNMP::Info::Layer3::Cisco for its own MIB requirements. GLOBALS
Global Methods imported from SNMP::Info::Layer3::Cisco See documentation in "GLOBALS" in SNMP::Info::Layer3::Cisco for details. TABLE METHODS
These are methods that return tables of information in the form of a reference to a hash. Overrides $fwsm->at_paddr() This function derives the at_paddr information from the n2p_paddr() table as the MIB to provide that information isn't supported on FWSMs. $fwsm->at_netaddr() This function derives the at_netaddr information from the n2p_paddr() table as the MIB to provide that information isn't supported on FWSMs. $fwsm->at_ifaddr() This function derives the at_ifaddr information from the n2p_paddr() table as the MIB to provide that information isn't supported on FWSMs. Table Methods imported from SNMP::Info::Layer3::Cisco See documentation in "TABLE METHODS" in SNMP::Info::Layer3::Cisco for details. perl v5.12.4 2011-09-28 Info::Layer3::CiscoFWSM(3pm)