First published: Thu Apr 09 2009(Updated: )
Memory leak on Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.0 before 7.0(8)6, 7.1 before 7.1(2)82, 7.2 before 7.2(4)30, 8.0 before 8.0(4)28, and 8.1 before 8.1(2)19 allows remote attackers to cause a denial of service (memory consumption or device reload) via a crafted TCP packet.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco PIX Firewall | =7.0 | |
Cisco PIX Firewall | =8.1 | |
Cisco Adaptive Security Appliance 5500 | =8.1 | |
Cisco Adaptive Security Appliance 5500 | =7.0 | |
Cisco PIX Firewall | =8.0 | |
Cisco Adaptive Security Appliance 5500 | =7.1 | |
Cisco Adaptive Security Appliance 5500 | =7.2 | |
Cisco Adaptive Security Appliance 5500 | =8.0 | |
Cisco PIX Firewall | =7.2 | |
Cisco PIX Firewall | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1157 has a severity rating that indicates it allows remote attackers to cause a denial of service through memory consumption.
To fix CVE-2009-1157, you should update the affected Cisco Adaptive Security Appliances and PIX Security Appliances to the recommended versions that address the memory leak.
CVE-2009-1157 affects Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances running specific versions prior to their patches.
The impact of CVE-2009-1157 includes potential denial of service, leading to memory exhaustion and possible device reload.
There are no specific workarounds for CVE-2009-1157; applying the relevant patches is the recommended approach.