![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.107066 |
Categoría: | CISCO |
Título: | Cisco ASA Software Identity Firewall Feature Buffer Overflow Vulnerability (cisco-sa-20161019-asa-idfw) |
Resumen: | A vulnerability in the Identity Firewall feature of Cisco ASA; Software could allow an unauthenticated, remote attacker to cause a reload of the affected system; or to remotely execute code. |
Descripción: | Summary: A vulnerability in the Identity Firewall feature of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. Vulnerability Insight: The vulnerability is due to a buffer overflow in the affected code area. An attacker could exploit this vulnerability by sending a crafted NetBIOS packet in response to a NetBIOS probe sent by the ASA software. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 traffic. Vulnerability Impact: An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or cause a reload of the affected system. Solution: See the referenced vendor advisory for a solution. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-6432 BugTraq ID: 93784 http://www.securityfocus.com/bid/93784 http://www.securitytracker.com/id/1037059 |
Copyright | Copyright (C) 2016 Greenbone Networks GmbH |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |