#VU12090 Buffer underflow in Cisco ASA 5500-X Series - CVE-2018-0231

 

#VU12090 Buffer underflow in Cisco ASA 5500-X Series - CVE-2018-0231

Published: April 18, 2018 / Updated: April 23, 2018


Vulnerability identifier: #VU12090
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0231
CWE-ID: CWE-124
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Cisco ASA 5500-X Series
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.

The weakness exists in the Transport Layer Security (TLS) library due to insufficient validation of user-supplied input. A remote attacker can send a malicious TLS message to an interface enabled for Secure Layer Socket (SSL) service, trigger buffer underflow and cause the service to crash.


Remediation

Update to versions 201.1(15.1), 201.1(1.97), 101.2(1.44), 100.13(0.173), 100.11(0.90), 99.1(22.1), 99.1(21.5), 99.1(20.127), 99.1(20.47), 99.1(10.21), 98.2(10.4), 98.2(0.8), 98.1(18.3), 98.1(16.8), 98.1(12.102), 98.1(1.150), 98.1(0.30), 97.1(0.169), 96.2(0.160), 9.8(2.9), 9.8(2), 9.8(1.99), 9.8(0.106), 9.7(1.16), 9.6(4), 9.6(3.18), 9.4(4.13), 9.2(4.26), 201.1(15.1), 201.1(1.97), 201.1(1.6), 101.2(1.44), 100.13(0.173), 100.11(0.90), 99.1(22.1), 99.1(21.9), 99.1(21.6), 99.1(20.127), 99.1(20.60), 99.1(20.51), 98.2(10.4), 98.2(0.8), 98.1(18.4), 98.1(16.8), 98.1(12.107), 98.1(1.154), 97.1(0.169), 96.2(0.160), 9.8(2.9), 9.8(2), 9.8(1.99), 9.7(1.16), 9.6(4), 9.6(3.18), 9.4(4.13), 9.2(4.26), 201.1(15.1), 201.1(1.97), 201.1(1.6), 101.2(1.44), 101.1(1.4), 100.13(0.173), 100.11(0.90), 99.1(22.1), 99.1(21.9), 99.1(20.127), 99.1(20.60), 98.2(10.4), 98.2(0.8), 98.1(18.6), 98.1(12.117), 97.1(0.169), 96.2(0.160), 9.8(2.9), 9.8(2), 9.8(1.99), 9.7(1.16), 9.6(4), 9.6(3.18), 9.4(4.13) or 9.2(4.26).

External links