-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2014-017 Title: Cisco Firewall Services Module Cut-Through Proxy Denial of Service Vulnerability [1] Version history: 19.02.2014 Initial publication Summary ======= Cisco Firewall Services Module (FWSM) Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected system. CVE numbers: CVE-2014-0710 Vulnerable systems ================== Cisco FWSM Software for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers Original Details ================ The vulnerability is due to a race condition when releasing the memory allocated by the cut-through proxy function. An attacker could exploit this vulnerability by sending traffic to match the condition that triggers cut-through proxy authentication. What can you do? ================ There is a patch. [1] What to tell your users? ======================== N/A More information ================ [1] http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm Best regards, CERT-EU (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJTBjJ+AAoJEPpzpNLI8SVo0gYP/25/1YZZl6Ybl8HIhiZMasXQ gUfH3lBH00w2HjvMBvdpCbSn6WnZeUUU1DBTYr4cE6cFsmfuvrw0ikopSeqiA9A8 CL1GtrK2HazBJl0inLXga/t2v6PmtC3x/e/88uwFDEZZWaUSZjLJJdz289iekCFx +Pwude34zhDHGV3gLNMpCpAQcgSo38EGuES+DKYqBim51Ol2F195T3PDIMiJI8u1 ZFW+thHYRJWy2ywYwLd1eyPqdFMMc5AHO314GnJS0o4uVALYUJFDztile8phlJ2E tMhKScWf6jkvDh3OZ3IUYAel/4z3yRvJeSP+kYnXx8KjHfH0I+yMYS8lUqvmkdk9 6h+0C04X4LmNyQJ1CvGsQl2H71+OyugBWHmQHkxwpy25nEihID+Vletr6zf8i5Vn A9SKPnQl30q2i2tKRPpIQU617og/jv4NDjmrmland+Ib7yPQBnPnXHamxAb4mgl3 qigEtmeBB0DQdW3f1IFnSthwHY2Wal2feRrp+D/+ocrSkxSrfALJ/I6gAYRArP2L lIp2SJqYDMZ++w7KUiy8ZQdWXqmxOQ7rXAJGDPdRZWVIqGSE33/KF1kWJFDlGtvs dGczSC+qnGn4Fw5sWlbzeujh2AzhprZ1qHfZbaTxj50E7CvXXcIb2dZbXyW5wTKg CsNfX9a8gHQzVA9o9KWa =uhgn -----END PGP SIGNATURE-----