Computer Security
[EN] securityvulns.ru no-pyccku


Cisco PIX / Adaptive Security Appliance firewalls multipls security vulnerabilities
Published:04.05.2007
Source:
SecurityVulns ID:7665
Type:remote
Threat Level:
6/10
Description:LDAP authentication bypass. VPN connection and LDAP multiple denial of service.
Affected:CISCO : PIX 7.1
 CISCO : ASA 7.1
 CISCO : PIX 7.2
 CISCO : ASA 7.2
CVE:CVE-2007-2464 (Race condition in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)19, when using "clientless SSL VPNs," allows remote attackers to cause a denial of service (device reload) via "non-standard SSL sessions.")
 CVE-2007-2463 (Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)17 allows remote attackers to cause a denial of service (device reload) via unknown vectors related to VPN connection termination and password expiry.)
 CVE-2007-2462 (Unspecified vulnerability in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 before 7.2(2)8, when using Layer 2 Tunneling Protocol (L2TP) or Remote Management Access, allows remote attackers to bypass LDAP authentication and gain privileges via unknown vectors.)
 CVE-2007-2461 (The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP servers to the agent, which consumes the memory allocated for a local buffer. NOTE: this issue only occurs when multiple DHCP servers are used.)
Original documentdocumentCISCO, Cisco Security Advisory: LDAP and VPN Vulnerabilities in PIX and ASA Appliances (04.05.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod