Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-11132

Опубликовано: 23 окт. 2024
Источник: fstec
CVSS3: 8.6
CVSS2: 7.8
EPSS Низкий

Описание

Уязвимость модуля Snort микропрограммного обеспечения межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Cisco Firepower Threat Defense (FTD) связана с выходом операции за границы буфера в памяти. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании

Вендор

Cisco Systems Inc.

Наименование ПО

Firepower Threat Defense
Snort

Версия ПО

7.0.0 (Firepower Threat Defense)
7.2.0 (Firepower Threat Defense)
7.2.0.1 (Firepower Threat Defense)
7.0.0.1 (Firepower Threat Defense)
7.0.1 (Firepower Threat Defense)
7.0.1.1 (Firepower Threat Defense)
7.0.2 (Firepower Threat Defense)
7.0.2.1 (Firepower Threat Defense)
7.0.3 (Firepower Threat Defense)
7.0.4 (Firepower Threat Defense)
7.1.0.1 (Firepower Threat Defense)
7.0.5 (Firepower Threat Defense)
7.1.0.3 (Firepower Threat Defense)
7.2.1 (Firepower Threat Defense)
7.2.2 (Firepower Threat Defense)
7.2.3 (Firepower Threat Defense)
7.3.0 (Firepower Threat Defense)
7.3.1 (Firepower Threat Defense)
7.3.1.1 (Firepower Threat Defense)
7.2.4 (Firepower Threat Defense)
7.0.6 (Firepower Threat Defense)
7.2.4.1 (Firepower Threat Defense)
7.2.5 (Firepower Threat Defense)
2 (Snort)
7.0.6.1 (Firepower Threat Defense)
7.2.5.1 (Firepower Threat Defense)
7.4.1 (Firepower Threat Defense)
7.3.1.2 (Firepower Threat Defense)
7.0.6.2 (Firepower Threat Defense)
7.2.5.2 (Firepower Threat Defense)
7.2.8.1 (Firepower Threat Defense)
7.4.1.1 (Firepower Threat Defense)
7.2.6 (Firepower Threat Defense)
7.2.7 (Firepower Threat Defense)
7.2.8 (Firepower Threat Defense)
7.4.2 (Firepower Threat Defense)
3 (Snort)
7.1.2 (Firepower Threat Defense)
7.0.6.3 (Firepower Threat Defense)

Тип ПО

ПО программно-аппаратного средства
Программное средство защиты

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,6)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd2100-snort-dos-M9HuMt75

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 41%
0.00193
Низкий

8.6 High

CVSS3

7.8 High

CVSS2

Связанные уязвимости

CVSS3: 8.6
nvd
больше 1 года назад

A vulnerability in the Snort 2 and Snort 3 TCP and UDP detection engine of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Appliances could allow an unauthenticated, remote attacker to cause memory corruption, which could cause the Snort detection engine to restart unexpectedly. This vulnerability is due to improper memory management when the Snort detection engine processes specific TCP or UDP packets. An attacker could exploit this vulnerability by sending crafted TCP or UDP packets through a device that is inspecting traffic using the Snort detection engine. A successful exploit could allow the attacker to restart the Snort detection engine repeatedly, which could cause a denial of service (DoS) condition. The DoS condition impacts only the traffic through the device that is examined by the Snort detection engine. The device can still be managed over the network. Note: Once a memory block is corrupted, it cannot be cleared until the Cisco Firepower

CVSS3: 8.6
github
больше 1 года назад

A vulnerability in the Snort 2 and Snort 3 TCP and UDP detection engine of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Appliances could allow an unauthenticated, remote attacker to cause memory corruption, which could cause the Snort detection engine to restart unexpectedly. This vulnerability is due to improper memory management when the Snort detection engine processes specific TCP or UDP packets. An attacker could exploit this vulnerability by sending crafted TCP or UDP packets through a device that is inspecting traffic using the Snort detection engine. A successful exploit could allow the attacker to restart the Snort detection engine repeatedly, which could cause a denial of service (DoS) condition. The DoS condition impacts only the traffic through the device that is examined by the Snort detection engine. The device can still be managed over the network. Note: Once a memory block is corrupted, it cannot be cleared until the Cisco Firepower ...

EPSS

Процентиль: 41%
0.00193
Низкий

8.6 High

CVSS3

7.8 High

CVSS2