Buffer underflow in Cisco ASA 5500-X Series - CVE-2018-0231

 

Buffer underflow in Cisco ASA 5500-X Series - CVE-2018-0231

Published: April 18, 2018 / Updated: April 23, 2018


Vulnerability identifier: #VU12090
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0231
CWE-ID: CWE-124
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco ASA 5500-X Series

Detailed vulnerability description

The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.

The weakness exists in the Transport Layer Security (TLS) library due to insufficient validation of user-supplied input. A remote attacker can send a malicious TLS message to an interface enabled for Secure Layer Socket (SSL) service, trigger buffer underflow and cause the service to crash.


How to mitigate CVE-2018-0231

Update to versions 201.1(15.1), 201.1(1.97), 101.2(1.44), 100.13(0.173), 100.11(0.90), 99.1(22.1), 99.1(21.5), 99.1(20.127), 99.1(20.47), 99.1(10.21), 98.2(10.4), 98.2(0.8), 98.1(18.3), 98.1(16.8), 98.1(12.102), 98.1(1.150), 98.1(0.30), 97.1(0.169), 96.2(0.160), 9.8(2.9), 9.8(2), 9.8(1.99), 9.8(0.106), 9.7(1.16), 9.6(4), 9.6(3.18), 9.4(4.13), 9.2(4.26), 201.1(15.1), 201.1(1.97), 201.1(1.6), 101.2(1.44), 100.13(0.173), 100.11(0.90), 99.1(22.1), 99.1(21.9), 99.1(21.6), 99.1(20.127), 99.1(20.60), 99.1(20.51), 98.2(10.4), 98.2(0.8), 98.1(18.4), 98.1(16.8), 98.1(12.107), 98.1(1.154), 97.1(0.169), 96.2(0.160), 9.8(2.9), 9.8(2), 9.8(1.99), 9.7(1.16), 9.6(4), 9.6(3.18), 9.4(4.13), 9.2(4.26), 201.1(15.1), 201.1(1.97), 201.1(1.6), 101.2(1.44), 101.1(1.4), 100.13(0.173), 100.11(0.90), 99.1(22.1), 99.1(21.9), 99.1(20.127), 99.1(20.60), 98.2(10.4), 98.2(0.8), 98.1(18.6), 98.1(12.117), 97.1(0.169), 96.2(0.160), 9.8(2.9), 9.8(2), 9.8(1.99), 9.7(1.16), 9.6(4), 9.6(3.18), 9.4(4.13) or 9.2(4.26).

Sources