First published: Fri Feb 16 2007(Updated: )
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firewall Services Module Software | =2.3 | |
Cisco Firewall Services Module Software | =3.1 | |
Cisco PIX Firewall | =7.1 | |
Cisco ASA 5500 CSC-SSM | =7.0 | |
Cisco ASA 5500 CSC-SSM | =7.1 | |
Cisco PIX Firewall | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0962 is classified as a high severity vulnerability due to its potential to cause a denial of service by remotely rebooting affected Cisco devices.
To remediate CVE-2007-0962, upgrade the affected Cisco devices to versions 7.0(4.14), 7.1(2.1), 2.3(4.12), or 3.1(3.24) or later.
CVE-2007-0962 affects Cisco PIX 500 and ASA 5500 series appliances, as well as the Firewall Services Module (FWSM) version 2.x and 3.x.
While it is technically possible to continue using affected Cisco devices, it is highly discouraged due to the risk of denial of service attacks.
CVE-2007-0962 exploits vulnerabilities in the 'inspect http' feature, allowing attackers to send malformed HTTP traffic to compromise the device.