Vulnerability Note VU#337508

Cisco ASA clientless SSL VPN denial of service vulnerability

Original Release date: 03 May 2007 | Last revised: 04 May 2007

Overview

The Cisco ASA firewall's SSL VPN component contains an denial-of-service vulnerability.

Description

The Cisco Adaptive Security Appliance (ASA) is firewall that includes routing, intrusion prevention system (IPS), and VPN components. The clientless SSL VPN allows remote users with a web browser to connect to internal web sites by tunneling an HTTPS session through the ASA.

The ASA's SSL VPN component contains a denial of service vulnerability.

Per Cisco Security Advisory cisco-sa-20070502-asa:

    A successful attack must exploit a race condition in the processing non-standard SSL sessions and may result in a reload of the device.

Impact

A remote unauthenticated attacker may be able to to create a denial-of-service condition. Note that any systems that rely on the affected device would also be affected.

Solution

Upgrade
Cisco has released an update to address this vulnerability. See the Software Versions and Fixes section of Cisco Security Advisory cisco-sa-20070502-asa for more details.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Cisco Systems, Inc.Affected-03 May 2007
Cisco Systems, Inc.Affected-03 May 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Cisco for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: Unknown
  • Date Public: 02 May 2007
  • Date First Published: 03 May 2007
  • Date Last Updated: 04 May 2007
  • Severity Metric: 0.70
  • Document Revision: 11

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.