First published: Wed May 02 2007(Updated: )
The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP servers to the agent, which consumes the memory allocated for a local buffer. NOTE: this issue only occurs when multiple DHCP servers are used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | =7.2.2 | |
Cisco PIX Firewall | =7.2 | |
Cisco Adaptive Security Appliance Software | =7.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2461 is classified as a high severity vulnerability due to the potential for a denial of service attack.
To mitigate CVE-2007-2461, it's recommended to upgrade the Cisco Adaptive Security Appliance and PIX Firewall to the latest firmware version.
CVE-2007-2461 affects Cisco Adaptive Security Appliance Software version 7.2.2 and Cisco PIX Firewall version 7.2.
CVE-2007-2461 can be exploited by sending malicious DHCPREQUEST or DHCPINFORM messages that prompt multiple DHCPACK responses.
Successful exploitation of CVE-2007-2461 can result in denial of service, causing the system to drop packets and degrade network performance.