Vulnerability Note VU#530057
Cisco ASA fails to properly process DHCP relay packets
The Cisco Adaptive Security Appliance contains a memory exhaustion vulnerability that may occur when the DHCP service relay is enabled.
The Cisco Adaptive Security Appliance (ASA) is firewall that includes routing and intrusion prevention system (IPS) features. DHCP relay allows network devices to forward DHCP broadcast packets from a network segment that does not have a DHCP server to one that does. The Cisco ASA supports DHCP relay.
The Cisco ASA DHCP relay service contains a memory exhaustion vulnerability. An attacker may trigger the vulnerability by sending a large number of DHCP requests to a vulnerable system.
An unauthenticated attacker may be able to create a denial-of-service condition.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Cisco Systems, Inc.||Affected||-||03 May 2007|
CVSS Metrics (Learn More)
This vulnerability was discovered by Lisa Sittler and Grant Deffenbaugh of CERT/CC.
This document was written by Ryan Giobbi.
- CVE IDs: Unknown
- Date Public: 02 May 2007
- Date First Published: 02 May 2007
- Date Last Updated: 03 May 2007
- Severity Metric: 0.64
- Document Revision: 27
If you have feedback, comments, or additional information about this vulnerability, please send us email.