CVE-2014-0710CVE-2014-0710

Affected configuration(s):

cpe:/a:cisco:firewall_services_module_software:3.1
cpe:/a:cisco:firewall_services_module_software:3.1%282%29
cpe:/a:cisco:firewall_services_module_software:3.1%283%29
cpe:/a:cisco:firewall_services_module_software:3.1%284%29
cpe:/a:cisco:firewall_services_module_software:3.1%285%29
cpe:/a:cisco:firewall_services_module_software:3.1%286%29
cpe:/a:cisco:firewall_services_module_software:3.1%287%29
cpe:/a:cisco:firewall_services_module_software:3.1%288%29
cpe:/a:cisco:firewall_services_module_software:3.1%289%29
cpe:/a:cisco:firewall_services_module_software:3.1%2810%29
cpe:/a:cisco:firewall_services_module_software:3.1%2811%29
cpe:/a:cisco:firewall_services_module_software:3.1%2812%29
cpe:/a:cisco:firewall_services_module_software:3.1%2813%29
cpe:/a:cisco:firewall_services_module_software:3.1%2814%29
cpe:/a:cisco:firewall_services_module_software:3.1%2815%29
cpe:/a:cisco:firewall_services_module_software:3.1%2816%29
cpe:/a:cisco:firewall_services_module_software:3.1%2817%29
cpe:/a:cisco:firewall_services_module_software:3.1%2818%29
cpe:/a:cisco:firewall_services_module_software:3.1%2819%29
cpe:/a:cisco:firewall_services_module_software:3.1%2820%29
cpe:/a:cisco:firewall_services_module_software:3.1%2821%29
cpe:/a:cisco:firewall_services_module_software:3.2
cpe:/a:cisco:firewall_services_module_software:3.2%281%29
cpe:/a:cisco:firewall_services_module_software:3.2%282%29
cpe:/a:cisco:firewall_services_module_software:3.2%283%29
cpe:/a:cisco:firewall_services_module_software:3.2%284%29
cpe:/a:cisco:firewall_services_module_software:3.2%285%29
cpe:/a:cisco:firewall_services_module_software:3.2%286%29
cpe:/a:cisco:firewall_services_module_software:3.2%287%29
cpe:/a:cisco:firewall_services_module_software:3.2%288%29
cpe:/a:cisco:firewall_services_module_software:3.2%289%29
cpe:/a:cisco:firewall_services_module_software:3.2%2810%29
cpe:/a:cisco:firewall_services_module_software:3.2%2811%29
cpe:/a:cisco:firewall_services_module_software:3.2%2812%29
cpe:/a:cisco:firewall_services_module_software:3.2%2813%29
cpe:/a:cisco:firewall_services_module_software:3.2%2814%29
cpe:/a:cisco:firewall_services_module_software:3.2%2815%29
cpe:/a:cisco:firewall_services_module_software:3.2%2816%29
cpe:/a:cisco:firewall_services_module_software:3.2%2817%29
cpe:/a:cisco:firewall_services_module_software:3.2%2818%29
cpe:/a:cisco:firewall_services_module_software:3.2%2819%29
cpe:/a:cisco:firewall_services_module_software:3.2%2820%29
cpe:/a:cisco:firewall_services_module_software:3.2%2821%29
cpe:/a:cisco:firewall_services_module_software:3.2%2822%29
cpe:/a:cisco:firewall_services_module_software:3.2%2823%29
cpe:/a:cisco:firewall_services_module_software:3.2%2824%29
cpe:/a:cisco:firewall_services_module_software:3.2%2825%29
cpe:/a:cisco:firewall_services_module_software:3.2%2826%29
cpe:/a:cisco:firewall_services_module_software:3.2%2827%29
cpe:/a:cisco:firewall_services_module_software:4.0
cpe:/a:cisco:firewall_services_module_software:4.0%281%29
cpe:/a:cisco:firewall_services_module_software:4.0%282%29
cpe:/a:cisco:firewall_services_module_software:4.0%283%29
cpe:/a:cisco:firewall_services_module_software:4.0%284%29
cpe:/a:cisco:firewall_services_module_software:4.0%285%29
cpe:/a:cisco:firewall_services_module_software:4.0%286%29
cpe:/a:cisco:firewall_services_module_software:4.0%287%29
cpe:/a:cisco:firewall_services_module_software:4.0%288%29
cpe:/a:cisco:firewall_services_module_software:4.0%2810%29
cpe:/a:cisco:firewall_services_module_software:4.0%2811%29
cpe:/a:cisco:firewall_services_module_software:4.0%2812%29
cpe:/a:cisco:firewall_services_module_software:4.0%2813%29
cpe:/a:cisco:firewall_services_module_software:4.0%2814%29
cpe:/a:cisco:firewall_services_module_software:4.0%2815%29
cpe:/a:cisco:firewall_services_module_software:4.1
cpe:/a:cisco:firewall_services_module_software:4.1%281%29
cpe:/a:cisco:firewall_services_module_software:4.1%282%29
cpe:/a:cisco:firewall_services_module_software:4.1%283%29
cpe:/a:cisco:firewall_services_module_software:4.1%284%29
cpe:/a:cisco:firewall_services_module_software:4.1%285%29
cpe:/a:cisco:firewall_services_module_software:4.1%286%29
cpe:/a:cisco:firewall_services_module_software:4.1%287%29
cpe:/a:cisco:firewall_services_module_software:4.1%288%29
cpe:/a:cisco:firewall_services_module_software:4.1%289%29
cpe:/a:cisco:firewall_services_module_software:4.1%2810%29
cpe:/a:cisco:firewall_services_module_software:4.1%2811%29
cpe:/a:cisco:firewall_services_module_software:4.1%2812%29
cpe:/a:cisco:firewall_services_module_software:4.1%2813%29
cpe:/a:cisco:firewall_services_module_software:4.1%2814%29

Date published: 2014-02-22T16:55:09.530-05:00

Date last modified: 2014-02-24T11:55:46.107-05:00

CVSS Score: 7.1

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm

Summary: Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.