First published: Thu Apr 09 2009(Updated: )
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.2 before 7.2(4)26, 8.0 before 8.0(4)22, and 8.1 before 8.1(2)12, when SQL*Net inspection is enabled, allows remote attackers to cause a denial of service (traceback and device reload) via a series of SQL*Net packets.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance 5500 | =7.2 | |
Cisco Adaptive Security Appliance 5500 | =8.0 | |
Cisco Adaptive Security Appliance 5500 | =8.1 | |
Cisco PIX Firewall | =7.2 | |
Cisco PIX Firewall | =8.0 | |
Cisco PIX Firewall | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1159 has a severity rating that indicates it can lead to a denial of service on affected devices.
To mitigate CVE-2009-1159, upgrade your Cisco Adaptive Security Appliances and PIX Security Appliances to the recommended version provided in vendor advisories.
CVE-2009-1159 affects Cisco Adaptive Security Appliance 5500 Series and PIX Security Appliances running specific versions of their software.
Yes, CVE-2009-1159 can be exploited remotely by attackers when SQL*Net inspection is enabled.
CVE-2009-1159 can cause a traceback and reload of affected devices, effectively leading to a denial of service.