Denial of service in Cisco ASA 5500-X Series



Published: 2016-10-19 | Updated: 2018-04-05
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-6439
CWE-ID CWE-399
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco ASA 5500-X Series
Hardware solutions / Security hardware applicances

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Denial of service

EUVDB-ID: #VU1047

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-6439

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote anauthenticated user to cause DoS conditions on the target system.
The weakness is due to resource management error. By sending a specially crafted data, attackers can trigger the Snort process restart and bypass Snort detection.
Successful exploitation results in denial of service that may lead to further attacks on the vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Cisco ASA 5500-X Series: 5.4.1.5 - 6.0.0.1

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161019-fpsnort


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###