First published: Wed Jun 04 2008(Updated: )
Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.1.x before 7.1(2)70, 7.2.x before 7.2(4), and 8.0.x before 8.0(3)10 allows remote attackers to cause a denial of service via a crafted TCP ACK packet to the device interface.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX 506E | =7.1 | |
Cisco PIX 506E | =7.2 | |
Cisco PIX 506E | =8.0 | |
Cisco Adaptive Security Appliance Software | =7.1 | |
Cisco Adaptive Security Appliance Software | =7.2.2 | |
Cisco Adaptive Security Appliance Software | =8.0 | |
Cisco Adaptive Security Appliance Software | =8.0 | |
Cisco Adaptive Security Appliance Software | =7.1 | |
Cisco Adaptive Security Appliance Software | =7.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2055 has a CVSS score that typically indicates a medium to high severity level due to its ability to cause denial of service.
To fix CVE-2008-2055, upgrade Cisco Adaptive Security Appliance or Cisco PIX software to appropriate versions that address the vulnerability.
CVE-2008-2055 affects Cisco Adaptive Security Appliances and Cisco PIX security appliances running certain versions before specified patches.
Yes, CVE-2008-2055 can be exploited remotely through crafted TCP ACK packets aimed at the device interface.
The impacted versions of Cisco software include 7.1.x before 7.1(2)70, 7.2.x before 7.2(4), and 8.0.x before 8.0(3)10.