Lucene search

K
nessusThis script is Copyright (C) 2010-2024 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO_ASA_MULTIPLE_FLAWS.NBIN
HistoryFeb 25, 2010 - 12:00 a.m.

Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances (cisco-sa-20100217-asa)

2010-02-2500:00:00
This script is Copyright (C) 2010-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
14

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.024 Low

EPSS

Percentile

90.0%

The remote host is a Cisco Adaptive Security Appliance (ASA). The remote version of the software used on this appliance is affected by the following security flaws :

  • A TCP connection exhaustion denial of service vulnerability. (CVE-2010-0149)

  • Two Session Initiation Protocol (SIP) inspection denial of service vulnerabilities. (CVE-2010-0150 and CVE-2010-0569)

  • A Skinny Client Control Protocol (SCCP) inspection denial of service vulnerability. (CVE-2010-0151)

  • A WebVPN Datagram Transport Layer Security (DTLS) denial of service vulnerability. (CVE-2010-0565)

  • A crafted TCP segment denial of service vulnerability.
    (CVE-2010-0566)

  • A crafted Internet Key Exchange (IKE) message denial of service vulnerability. (CVE-2010-0567)

  • An NT LAN Manager version 1 (NTLMv1) authentication bypass vulnerability. (CVE-2010-0568)

An attacker could exploit these flaws to crash the remote device, or to log into the remote VPN (when configured to use NTLMv1 authentication).

Binary data cisco_asa_multiple_flaws.nbin

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.024 Low

EPSS

Percentile

90.0%

Related for CISCO_ASA_MULTIPLE_FLAWS.NBIN