Cisco patch blocks DoS vulnerability

If miscreants managed to gain entry to IPsec code, they'd be capable of erasing available memory.
If miscreants managed to gain entry to IPsec code, they'd be capable of erasing available memory.

Remote attackers have been shut out of the IPsec code of Cisco Adaptive Security Appliance (ASA) Software following Tuesday's release of a patch, according to a Cisco security advisory.

The incursion could have allowed attackers to alter a memory block, which subsequently may cause the system to cease transferring traffic culminating in a denial-of-service (DoS) situation.

The bug was the result of an error in the installation of ICMP error handling for IPSec packets, Cisco said.

"An attacker could exploit this vulnerability by sending crafted packets through an established LAN-to-LAN or Remote Access VPN tunnel," the researchers explained. 
The company has released software updates to mitigate the situation.

While the Cisco Product Security Incident Response Team (PSIRT) stated it is not aware of any malicious use of this vulnerability, as always, it advises customers to upgrade.
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS