Is this normal for the list to diretly get Cisco security advisories
or something new. First time I have seen these.
Robert
On Wed, 26 Mar 2014 12:10:00 -0400
Cisco Systems Product Security Incident Response Team
<ps...@cisco.com> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco IOS Software SSL VPN Denial of Service Vulnerability
Advisory ID: cisco-sa-20140326-ios-sslvpn
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
=======
A vulnerability in the Secure Sockets Layer (SSL) VPN subsystem of
Cisco IOS Software could allow an unauthenticated, remote attacker to
cause a denial of service (DoS) condition.
The vulnerability is due to a failure to process certain types of
HTTP requests. To exploit the vulnerability, an attacker could submit
crafted requests designed to consume memory to an affected device. An
exploit could allow the attacker to consume and fragment memory on
the affected device. This may cause reduced performance, a failure of
certain processes, or a restart of the affected device.
Cisco has released free software updates that address this
vulnerability.
There are no workarounds to mitigate this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ios-sslvpn
Note: The March 26, 2014, Cisco IOS Software Security Advisory
bundled publication includes six Cisco Security Advisories. All
advisories address vulnerabilities in Cisco IOS Software. Each Cisco
IOS Software Security Advisory lists the Cisco IOS Software releases
that correct the vulnerability or vulnerabilities detailed in the
advisory as well as the Cisco IOS Software releases that correct all
Cisco IOS Software vulnerabilities in the March 2014 bundled
publication.
Individual publication links are in Cisco Event Response: Semiannual
Cisco IOS Software Security Advisory Bundled Publication at the
following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=1Ixo
-----END PGP SIGNATURE-----