-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2012-0040 Title: Denial of Service Vulnerability in Cisco Firewall [1] Version history: 16.03.2012 Initial publication Summary ======= When multicast routing is enabled, these devices allow remote attackers to cause a denial of service (device reload) via a crafted IPv4 PIM message, aka Bug IDs CSCtr47517 and CSCtu97367.[2] CVE-2012-0356 CVSS v2 Base Score:7.8 (HIGH) (AV:N/AC:L/Au:N/C:N/I:N/A:C) [3] Vulnerable systems ================== Cisco Catalyst 6500 Series Firewall Services Module Original Details ================ The Cisco Catalyst 6500 Series Firewall Services Module (FWSM) contains a Protocol Independent Multicast (PIM) Denial of Service Vulnerability. What can you do? ================ Cisco has released free software updates that address this vulnerability. There are no workarounds available that mitigate this vulnerability. [1] What to tell your users? ======================== N/A More information ================ [1]http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120314-fwsm [2]http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0356 [3]Information about CVSS: http://www.first.org/cvss/cvss-guide.html Best regards, CERT-EU CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 (DISCLAIMER: CERT-EU, the CERT for the EU institutions, is currently in its setup phase, until May 2012. Services are provided in a pilot fashion, and are not yet fully functional. Announcements, alerts and warnings are sent out in best effort manner, and to contact information currently known to us. We apologise if you are not the correct recipient, or if you had already been warned about this issue from another source . Format, content and way of alerting are subject to change in the future. Contact information or even the team name may change as well.) -----BEGIN PGP SIGNATURE----- Version: BCPG v1.39 iQJXBAEBAgBBBQJPZybjOhxDRVJUIGZvciB0aGUgRXVyb3BlYW4gSW5zdGl0dXRp b25zIDxjZXJ0LWV1QGVjLmV1cm9wYS5ldT4ACgkQJ6QGykasQ4N5Uw//V+mzNNEJ W3K0vCXBvFPvhmjX1b7RpJkdWicY7RI9sYcoFP8rJBJb2Wf6QS/P180Za5ZIKfuN OycLDqHZFlhgu+n999gUYEJPNryOeABxdSgXkXTDmCDxpvT3/rix0sSYdyEWRUO5 DrpiWt5Kyn8laZ9QKFCUM40kINp63UI0nkS/CS3bynbA8xOfT9GqV6iZ5CtuNiX7 cs7YXqKsvlpUsqlr6kZj/Theb1l5lfs1iVpu62YdWNmuzknnuol8vDYkzl6l8RQt AMLJIhp/ju19xQ+gMlj/7XJSIyvEPblp8RMr2+FYnVH62c3IDM1d27b/8pWxbI5y 8IHRA9HLKhv64mmRjVexgMghx6G3nR2fvUDFsRaAZZKhvpBSQ0gcN8ZmZE7nHq+L bxDX00SbIAeovPpHgRq2j7TOANDvaXk0oUU6xJyxYUZAQK89kUuhZLN5nNgv/aIY 4JOyw5wKzjDdENUs1Nsm9UXWFkDZZDVeVQGNvS487exQwbGiHn1yhKXjmUVkusjR RJRNyAd6Kv8SqvtHpAvJx3zITunR4YRCv5cIV5TBEQiI4EFrIO5f1bDPVozTF97g o2tPb5Jg17+oScNIOq23XsRqnyXGoIz46fK5wfkcI8dCrkInlhhP2fJxt+TzhiGf 1nmPdLNo0bHxEgj/WtQVuBYmC1t/qJ13bOs= =NV/o -----END PGP SIGNATURE-----