First published: Thu Nov 24 2005(Updated: )
Race condition in Cisco Adaptive Security Appliance (ASA) 7.0(0), 7.0(2), and 7.0(4), when running with an Active/Standby configuration and when the failover LAN interface fails, allows remote attackers to cause a denial of service (standby firewall failure) by sending spoofed ARP responses from an IP address of an active firewall, which prevents the standby firewall from becoming active, aka "failover denial of service."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =7.0\(0\) | |
Cisco Adaptive Security Appliance Software | =7.0\(2\) | |
Cisco Adaptive Security Appliance Software | =7.0\(4\) | |
Cisco Adaptive Security Appliance Software | =7.0\(2\) | |
Cisco Adaptive Security Appliance Software | =7.0\(0\) | |
Cisco Adaptive Security Appliance Software | =7.0\(4\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3788 is classified as a denial of service vulnerability that can lead to a failure of the standby firewall in Cisco Adaptive Security Appliance systems.
To fix CVE-2005-3788, you should upgrade to a patch version of the Cisco Adaptive Security Appliance software where the vulnerability is mitigated.
CVE-2005-3788 affects Cisco Adaptive Security Appliance software versions 7.0(0), 7.0(2), and 7.0(4) when configured in an Active/Standby setup.
Yes, CVE-2005-3788 can be exploited remotely by attackers sending spoofed ARP responses.
The impact of CVE-2005-3788 on network security includes potential downtime and disruption of services due to a compromised standby firewall.