First published: Thu Apr 09 2009(Updated: )
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 Series devices 8.0 before 8.0(4)25 and 8.1 before 8.1(2)15, when an SSL VPN or ASDM access is configured, allows remote attackers to cause a denial of service (device reload) via a crafted (1) SSL or (2) HTTP packet.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance 5500 | =8.0 | |
Cisco Adaptive Security Appliance 5500 | =8.1 | |
Cisco PIX Firewall | =8.0 | |
Cisco PIX Firewall | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1156 is classified as a high severity vulnerability due to its potential to cause a denial of service on affected Cisco devices.
To fix CVE-2009-1156, you should upgrade the affected Cisco Adaptive Security Appliances to version 8.0(4)25 or 8.1(2)15 or later.
CVE-2009-1156 affects Cisco Adaptive Security Appliances 5500 Series devices and Cisco PIX Firewalls running specific versions of the software.
CVE-2009-1156 can be exploited via crafted SSL or HTTP packets sent by remote attackers, leading to device reloads.
Cisco has not provided specific workarounds for CVE-2009-1156, and the recommended action is to apply the software updates to mitigate the vulnerability.