First published: Wed May 02 2007(Updated: )
Race condition in Cisco Adaptive Security Appliance (ASA) and PIX 7.1 before 7.1(2)49 and 7.2 before 7.2(2)19, when using "clientless SSL VPNs," allows remote attackers to cause a denial of service (device reload) via "non-standard SSL sessions."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX Firewall | <=7.2 | |
Cisco PIX Firewall | =7.1 | |
Cisco Adaptive Security Appliance Software | <=7.2.2 | |
Cisco Adaptive Security Appliance Software | =7.1 | |
Cisco Adaptive Security Appliance Software | =7.1 | |
Cisco Adaptive Security Appliance Software | <=7.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2464 has a high severity rating as it allows remote attackers to trigger a denial of service by causing the device to reload.
To mitigate CVE-2007-2464, it is recommended to upgrade to the fixed versions of the Cisco Adaptive Security Appliance Software or PIX firmware.
CVE-2007-2464 affects Cisco Adaptive Security Appliances and PIX devices running specific versions below 7.1(2)49 and 7.2(2)19.
CVE-2007-2464 is associated with denial of service attacks using non-standard SSL sessions on Cisco devices.
While upgrading is the best solution for CVE-2007-2464, disabling clientless SSL VPNs may serve as a temporary workaround.