First published: Fri Feb 19 2010(Updated: )
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.2 before 7.2(4.46), 8.0 before 8.0(4.38), 8.1 before 8.1(2.29), and 8.2 before 8.2(1.5); and Cisco PIX 500 Series Security Appliance; allows remote attackers to cause a denial of service (prevention of new connections) via crafted TCP segments during termination of the TCP connection that cause the connection to remain in CLOSEWAIT status, aka "TCP Connection Exhaustion Denial of Service Vulnerability."
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA 5500 CSC-SSM | =8.0 | |
Cisco PIX | ||
Cisco ASA 5500 CSC-SSM | =8.2 | |
Cisco ASA 5500 CSC-SSM | =7.2 | |
Cisco ASA 5500 CSC-SSM | =7.1 | |
Cisco ASA 5500 CSC-SSM | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0149 is classified as a denial of service vulnerability that allows remote attackers to prevent new connections.
To mitigate CVE-2010-0149, upgrade your Cisco ASA 5500 or PIX 500 Series Security Appliance to a version that is later than those specified.
CVE-2010-0149 affects Cisco ASA 5500 Series Adaptive Security Appliances running versions 7.2, 8.0, 8.1, and 8.2, as well as Cisco PIX 500 Series Security Appliances.
Versions of Cisco ASA 5500 Series Adaptive Security Appliance prior to 7.2(4.46), 8.0(4.38), 8.1(2.29), and 8.2(1.5) are vulnerable to CVE-2010-0149.
CVE-2010-0149 can be exploited by remote attackers to launch denial of service attacks that prevent new connections to the affected devices.