Skip to main content

Cisco Firewall Services Module Security Bypass and Denial of Service Vulnerabilities

Last Update Date: 7 Oct 2011 15:10 Release Date: 7 Oct 2011 5096 Views

RISK: High Risk

TYPE: Security software and application - Security Software & Appliance

TYPE: Security Software & Appliance

Multiple vulnerabilities have been identified in Cisco Firewall Services Module (FWSM), which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).

  1. An error in the implementation of the system log message ID 302015 when generating a log message for IPv6 traffic can be exploited to cause a memory corruption.

    Successful exploitation of this vulnerability requires that the FWSM has interfaces with IPv6 addresses.

  2. An error in the authentication proxy feature during a high number of network access authentication requests related to the "aaa authentication match" and "aaa authentication include" commands can be exploited to cause a crash.
  3. An error in the TACACS+ implementation can be exploited to bypass the TACACS+ authentication mechanism.
  4.  Four errors in the SunRPC inspection engine while processing certain SunRPC messages can be exploited to reload a device via specially crafted SunRPC packets that transit the appliance.
  5.  An error in the ILS inspection engine while processing certain ILS messages can be exploited to reload a device via specially crafted ILS packets that transit the appliance.

Impact

  • Denial of Service
  • Security Restriction Bypass

System / Technologies affected

  • Cisco Firewall Services Module (FWSM) 3.x
  • Cisco Firewall Services Module (FWSM) 4.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 3.1(21), 3.2(22), 4.0(16), or 4.1(7).

Vulnerability Identifier


Source


Related Link