Информационная безопасность
[RU] switch to English


Многочисленные уязвимости в брандмауэрах Cisco PIX / Adaptive Security Appliance
Опубликовано:4 мая 2007 г.
Источник:
SecurityVulns ID:7665
Тип:удаленная
Уровень опасности:
6/10
Описание:Обход LDAP-аутентификации, отказ в обслуживании через различные типы VPN-подключений и LDAP.
Затронутые продукты:CISCO : PIX 7.1
 CISCO : ASA 7.1
 CISCO : PIX 7.2
 CISCO : ASA 7.2
CVE:CVE-2007-2464 (Race condition in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)19, when using "clientless SSL VPNs," allows remote attackers to cause a denial of service (device reload) via "non-standard SSL sessions.")
 CVE-2007-2463 (Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)17 allows remote attackers to cause a denial of service (device reload) via unknown vectors related to VPN connection termination and password expiry.)
 CVE-2007-2462 (Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 before 7.2(2)8, when using Layer 2 Tunneling Protocol (L2TP) or Remote Management Access, allows remote attackers to bypass LDAP authentication and gain privileges via unknown vectors.)
 CVE-2007-2461 (The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP servers to the agent, which consumes the memory allocated for a local buffer. NOTE: this issue only occurs when multiple DHCP servers are used.)
Оригинальный текстdocumentCISCO, Cisco Security Advisory: LDAP and VPN Vulnerabilities in PIX and ASA Appliances (04.05.2007)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород