First published: Thu Jul 18 2013(Updated: )
Cisco Intrusion Prevention System (IPS) Software in ASA 5500-X IPS-SSP software modules before 7.1(7)sp1E4 allows remote attackers to cause a denial of service (Analysis Engine process hang or device reload) via fragmented (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCue51272.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASA 5500-X series IPS SSP Software | =7.1 | |
Cisco Intrusion Prevention System | <=7.1 | |
Cisco ASA 5585-X | ||
Cisco Intrusion Detection System (IDS) | ||
Cisco IPS Sensor Software | ||
Cisco IPS Sensor Software | ||
Cisco IPS Sensor Software | ||
Cisco IPS 4520 sensor | ||
Cisco IPS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1218 has a severity rating that can lead to significant denial of service events affecting network availability.
To fix CVE-2013-1218, upgrade the Cisco IPS or ASA 5500-X software to a version that is 7.1(7)sp1E4 or later.
CVE-2013-1218 affects Cisco ASA 5500-X series IPS SSP software and various models of Cisco intrusion prevention and detection systems.
Yes, CVE-2013-1218 can be exploited remotely by sending specially crafted fragmented packets.
CVE-2013-1218 facilitates denial of service attacks by causing the Analysis Engine process to hang or the device to reload.