Cisco Warns Of DoS Vulnerabilities In Catalyst, ASA Lines
The affected products are Cisco Catalyst 6500 Series switches and Cisco 7600 Series routers. According to Cisco, the vulnerabilities "may cause the Cisco FWSM to reload after processing crafted SunRPC or certain TCP packets."
"Repeated exploitation," Cisco advised, "could result in a sustained DoS condition."
Cisco states that it provided free software updates, and in the advisory, also describes workarounds for dealing with the vulnerabilities. The vulnerabilities are independent of each other, the vendor notes.
In a separate advisory, Cisco also confirmed multiple vulnerabilities for its Cisco ASA 5500 Series Adaptive Security Appliances.
According to Cisco, the vulnerabilities are three SunRPC inspection DoS vulnerabilities, three transport layer security DoS vulnerabilities, a session initiated protocol (SIP) inspection DoS vulnerability, and a crafted internet key exchange (IKE) message denial of service vulnerability.
The ASA vulnerabilities are "not interdependent," Cisco noted, and in the advisory, it directs users to various workaround options.