2 results (0.003 seconds)

CVSS: 8.6EPSS: 0%CPEs: 24EXPL: 0

A vulnerability in the data plane IP fragment handler of the Cisco Adaptive Security Appliance (ASA) CX Context-Aware Security module could allow an unauthenticated, remote attacker to cause the CX module to be unable to process further traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of IP fragments. An attacker could exploit this vulnerability by sending crafted fragmented IP traffic across the CX module. An exploit could allow the attacker to exhaust free packet buffers in shared memory (SHM), causing the CX module to be unable to process further traffic, resulting in a DoS condition. This vulnerability affects all versions of the ASA CX Context-Aware Security module. • http://www.securityfocus.com/bid/95788 http://www.securitytracker.com/id/1037696 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170125-cas • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 21EXPL: 0

The virtualization layer in Cisco ASA FirePOWER Software before 5.3.1.2 and 5.4.x before 5.4.0.1 and ASA Context-Aware (CX) Software before 9.3.2.1-9 allows remote attackers to cause a denial of service (device reload) by rapidly sending crafted packets to the management interface, aka Bug IDs CSCus11007 and CSCun56954. La capa de virtualización en Software Cisco ASA FirePOWER anterior a 5.3.1.2 y 5.4.x anterior a 5.4.0.1 y Software ASA Context-Aware (CX) anterior a 9.3.2.1-9 permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) mediante el envío rápido de paquetes manipulados a la interfaz de gestión, también conocido como Bug IDs CSCus11007 y CSCun56954. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-cxfp http://www.securitytracker.com/id/1032046 • CWE-20: Improper Input Validation •