Cisco Blog » The Platform

2015年7月1日星期三

Cisco Notification Alert -ASA 5500 Series NG Firewall-01-Jul-2015 16:49 GMT

 

 

 

 

 

 

 


End-of-Sale and End-of-Life Announcements for ASA 5500-X Series Next-Generation Firewalls

Title:
End-of-Sale and End-of-Life Announcement for the Cisco ASA CX Context-Aware Security and Cisco Prime Security Manager
Description:

Cisco announces the end-of-sale and end-of life dates for the Cisco ASA CX Context-Aware Security and Cisco Prime Security Manager. The last day to order the affected product(s) is August 17, 2015. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract.

Date:
18-JUN-2015

Find additional information in End-of-Sale and End-of-Life Products

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim
Alert Type:
New File
File Name:
asa941-3-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
24-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
New File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Application Centric Infrastructure (ACI) Security Device Package
Release Version:
1.2.1.2
Alert Type:
New File
File Name:
asa-device-pkg-1.2.1.2.zip
File Description:

Cisco ASA Device Package 1.2(1.2) for Cisco APIC 1.1(1j)

File Release Date:
14-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
New File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim
Alert Type:
New File
File Name:
asa941-3-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Application Centric Infrastructure (ACI) Security Device Package
Release Version:
1.2.1.2
Alert Type:
New File
File Name:
asa-device-pkg-1.2.1.2.zip
File Description:

Cisco ASA Device Package 1.2(1.2) for Cisco APIC 1.1(1j)

File Release Date:
14-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim
Alert Type:
New File
File Name:
asa941-3-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
24-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
New File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
New File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim
Alert Type:
New File
File Name:
asa941-3-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
24-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Application Centric Infrastructure (ACI) Security Device Package
Release Version:
1.2.1.2
Alert Type:
New File
File Name:
asa-device-pkg-1.2.1.2.zip
File Description:

Cisco ASA Device Package 1.2(1.2) for Cisco APIC 1.1(1j)

File Release Date:
14-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Application Centric Infrastructure (ACI) Security Device Package
Release Version:
1.2.1.2
Alert Type:
New File
File Name:
asa-device-pkg-1.2.1.2.zip
File Description:

Cisco ASA Device Package 1.2(1.2) for Cisco APIC 1.1(1j)

File Release Date:
14-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
New File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim
Alert Type:
New File
File Name:
asa941-3-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
24-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Application Centric Infrastructure (ACI) Security Device Package
Release Version:
1.2.1.2
Alert Type:
New File
File Name:
asa-device-pkg-1.2.1.2.zip
File Description:

Cisco ASA Device Package 1.2(1.2) for Cisco APIC 1.1(1j)

File Release Date:
14-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.4.3
Alert Type:
New File
File Name:
asdm-743.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, and 9.4.

File Release Date:
24-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Application Centric Infrastructure (ACI) Security Device Package
Release Version:
1.2.1.2
Alert Type:
New File
File Name:
asa-device-pkg-1.2.1.2.zip
File Description:

Cisco ASA Device Package 1.2(1.2) for Cisco APIC 1.1(1j)

File Release Date:
14-JUN-2015
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim
Alert Type:
New File
File Name:
asa941-3-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
24-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
New File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-JUN-2015

Software Updates for ASA 5500-X Series Next-Generation Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
New File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
11-JUN-2015
Find additional information in Software Downloads index.

Known Bugs - ASA 5500-X Series Next-Generation Firewalls

Bug Id:
CSCtx60431
Title:
Traceback in Thread Name: Dispatch Unit due to Websense URL Filtering
Description:

Symptom:
Under rare situations, The ASA may crash with The thread "Dispatch Unit". The crash is observed with URL Filtering configuration enabled.

Conditions:
ASA running version 8.4.3
Web-sense URL filtering configuration


Workaround:

- Change 'url-server (County_Inside) vendor websense host 10.10.4.44 timeout 30 protocol TCP version 1 connections 5'

to 'url-server (County_Inside) vendor websense host 10.10.4.44 timeout 30 protocol TCP version 4 connections 5'

- Or

change to 'url-server (County_Inside) vendor websense host 10.10.4.44 timeout 30 protocol UDP version 1 connections 5'

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
8.4(3)
Known Fixed Releases:
100.7(13.87), 100.7(6.85), 100.8(0.184), 100.8(11.28), 100.8(27.19), 100.8(33.12), 100.8(34.1), 100.8(35.2), 100.8(36.1), 100.9(0.1)
Bug Id:
CSCtj09979
Title:
IKEv2 traceback with 1 L2L and 1 RA tunnel
Description:

Symptom:
Active ASA may crash inThread Name: DATAPATH-2-1403

Conditions:
This was first identified on an ASA5585 failover pair running 8.2.4 code.

Workaround:
None at this time.

Further Problem Description:
The next 8.2.5(x) interim will contain the fix for this defect.

Status:
Fixed
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
8.4(0.119), 8.4(0.15)
Known Fixed Releases:
100.7(0.67), 100.7(0.71), 100.7(0.75), 100.7(11.2), 100.7(13.1), 100.7(6.12), 100.7(6.15), 100.7(6.21), 100.7(8.1), 100.7(8.12)
Bug Id:
CSCuh41688
Title:
5585X-SSP60 8.4(5)6 Secondary unit crash
Description:

Symptom:
ASA 5585X-SSP60 transparent firewall in A/A failover environment crashed

Conditions:
Normal operation

Workaround:
None

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
8.4(5.6)
Known Fixed Releases:
Bug Id:
CSCul77722
Title:
Traceback with assertion "0" failed: file "malloc.c", line 5839
Description:

Symptom:
ASA failover cluster crashes in Checkheaps with assertion "0" failed: file "malloc.c", line 5839.At the time of the crash no new SSL connection are accepted by ASA, while existing SSL connections seems to work fine.

Conditions:
ASA crashes on Checkheaps.

Workaround:
No workaround as of now

Further Problem Description:

Status:
Other
Severity:
1 Catastrophic
Last Modified:
01-JUN-2015
Known Affected Releases:
9.1(3)
Known Fixed Releases:
Bug Id:
CSCui51199
Title:
Cisco ASA Clientless SSL VPN Rewriter Denial of Service
Description:

Symptom:
ASA reload with traceback in Unicorn Proxy

Conditions:
- Webvpn is enabled on more then one interface
- same-security-traffic permit intra-interface and management-access commands are configured

This is affecting on 9.0 and 9.1 trains

Workaround:
There is a workaround using a webvpn filter to block the clientless users from accessing https on the inside interface:

Here's an example that QA tested:

Using this ACL:
access-list deny_pub_priv webtype deny url https://93.124.22.2 (where 93.124.22.2 is the asa private ip address)

And this in the group policy:

group-policy WebVPN1 attributes
webvpn
filter value deny_pub_priv

Now when you browse to that address you get a message that states ?access to this recourse has been denied? and NO crash!

The we can see the acl is working be looking at the hit count as seen here (show access-list):
access-list deny_pub_priv line 1 webtype deny url https://93.124.22.2 (hitcnt=3)

Further Problem Description:
A vulnerability in Clientless SSL VPN feature of Cisco ASA Software could allow an authenticated, remote attacker to cause the reload of an
affected system.

The vulnerability is due to a stack overflow while browsing internal resources via the Clientless SSL VPN portal when the same-security-traffic
permit intra-interface and management-access commands are configured. An attacker could exploit this vulnerability by accessing crafted URL
through the SSL VPN portal. An exploit could allow the attacker to reload the affected system and create a denial of service condition.


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-5551 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5551

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
01-JUN-2015
Known Affected Releases:
9.0(2), 9.0(3), 9.1(2), 9.1(3)
Known Fixed Releases:
100.10(0.24), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.8(38.47), 100.8(40.32), 100.8(45.6), 100.8(46.11), 100.8(51.1), 100.9(10.12)
Bug Id:
CSCut63154
Title:
ASA crashes after NAT configuration changes via SSH
Description:

Symptom:
ASA crashes after NAT configuration changes via SSH

Conditions:

Workaround:
NA

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
01-JUN-2015
Known Affected Releases:
9.1(5.21)
Known Fixed Releases:
Bug Id:
CSCtt26116
Title:
Traceback due to double free of memory block in SNP
Description:








Symptom:

Customer was crashing frequently after adding remote access clients. Previously, they had run without
crashing when only using site-to-site. After adding remote access, they began crashing as often as
hourly.

Conditions:
n/a

Workaround:

None

Status:
Terminated
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
8.2(5)
Known Fixed Releases:
Bug Id:
CSCut24720
Title:
AnyConnect failing to match dap record after upgrade to 9.3.2
Description:

Symptom:
AnyConnect failing to match dap record after upgrade to 9.3.2 from 9.3.1

Conditions:
After upgrade to 9.3.2

Workaround:
rename affected DAP records

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
Bug Id:
CSCum70178
Title:
Datapath:Observing Deadlock in different DATAPATH threads
Description:

Symptom:
Cisco ASA working as a Failover Standby Unit, periodically reloads in thread name datapath.

Crash message could be like the following :

Deadlock in thread DATAPATH-9-2588, from:
Traceback from thread DATAPATH-9-2588:
Test scenario was Multiple ftp Clients from Outside to single FTP Server on Inside, with 1K conn/sec rate

Conditions:
Cisco ASA 8.4 when configured as standby in a failover pair.
Reason problem is more evident on Standby could be that, as there isn't much work to do,
it is possible that multiple Cores to work on flow-time-out at the same time

As part of detaching a flow from host->h_tcp_eflow emb-flow-count is being decremeted
But this is being done for a paired_flow->host, while holding the flow->host lock

This can lead to dead-locck, in the following senario :
Core-1 :
Forward_flow->host_A host-lock was acquired snp_host_detach_flow and invoke snp_flow_dec_host_tcp_eflow_counters
Reverse_flow->host_B host-lock is attempt to acquire at snp_flow_dec_host_tcp_eflow_counters.

Core-2 :
Forward_flow->host_A host-lock was acquired snp_host_detach_flow and invoke snp_flow_dec_host_tcp_eflow_counters
Reverse_flow->host_B host-lock is attempt to acquire at snp_flow_dec_host_tcp_eflow_counters.


Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
100.8(38.102), 8.4(7.9), 9.1, 9.1(4.5), 9.1(5)
Known Fixed Releases:
100.10(9.6), 100.7(6.131), 100.8(38.126), 100.8(40.68), 100.8(56.32), 100.8(63.2), 100.8(64.6), 100.8(65.4), 100.8(66.7), 8.2(5.50)
Bug Id:
CSCum35118
Title:
ASA:Traceback in Thread Name: DATAPATH-23-2334
Description:

Symptom:
ASA (8.4.5) crashed in Thread Name: DATAPATH-23-2334

Conditions:
First observed in ASA running 8.4.5.

Delete of thread-detection policy while such policy is still in-used and with live traffics going through the network. This can include reconfiguration or failover synching.

Workaround:
Shutdown interfaces and do "clear local-host all" before making change to the thread detection policy.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
8.4(5)
Known Fixed Releases:
100.10(9.5), 100.11(4.1), 100.7(6.129), 100.8(38.114), 100.8(40.60), 100.8(56.20), 100.8(62.2), 100.8(64.1), 100.8(65.3), 100.8(66.3)
Bug Id:
CSCus23416
Title:
ASA traceback in DATAPATH-1-2414 after software upgrade
Description:

Symptom:
ASA crash in DATAPATH-1-2414 after software upgrade

Conditions:
huge ACL size

Workaround:
none

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
9.0(4.13)
Known Fixed Releases:
100.11(0.56), 100.12(0.112), 100.13(0.26), 100.13(19.9), 100.13(20.10), 100.13(21.7), 100.14(0.3), 100.14(1.2), 100.14(10.3), 100.14(11.3)
Bug Id:
CSCuu63223
Title:
ASA 9.3(1) shared license server stops distributing licenses randomnly
Description:

Symptom:
ASA SSLVPN shared license server stops distributing licenses at random intervals. Output of "show shared license" shows wrong values for Available and Utilized licenses.

Shared license utilization:
AnyConnect Premium:
Total for network : 1000
Available : 287789076
Utilized : -287788076
This device:
Platform limit : 1004
Current usage : -287788376
High usage : 150

Conditions:
Issue seen in ASA 9.3(1) acting as a license server.

Workaround:
None. Reload fixes the issue.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
9.3(1)
Known Fixed Releases:
Bug Id:
CSCuh20372
Title:
ASA adds 'extended' keyword to static manual nat configuration line
Description:

Symptom:
This problem was introduced in version 9.1(2)1. It does not affect version 9.1(2)

If a static manual NAT line is added to the configuration, the 'extended' keyword is also incorrectly added to the configuration line by the parser

Example:
ASA(config)#nat (any,any) source static dmz-pc dmz-pc destination static vpn-network vpn-network
ASA(config)#
ASA(config)#show run nat
nat (any,any) source static dmz-pc dmz-pc destination extended static vpn-network vpn-network
ASA(config)#

The configuration then can no longer be removed by putting a 'no' in front of the entire line:
ASA(config)#no nat (any,any) source static dmz-pc dmz-pc destination extended static vpn-network vpn-network
^
ERROR: % Invalid input detected at '^' marker.
ASA#

Additionally, after this problem is encountered after upgrading to 9.1(2)1, if the configuration is saved and the ASA is rebooted so that it boots up 9.1(2), the manual NAT commands with the 'extended' keyword will fail to be loaded into the configuration due to the syntax error.

Conditions:
ASA running 9.1(2)1 or later. 9.1(2) is not affected by this problem.

Manual NAT (aka Twice NAT) is affected by this problem, but auto-NAT (aka object-NAT) is not.

Workaround:
If possible, downgrade the ASA to version 9.1(2) and ensure that the manual NAT lines are present in the configuration. If necessary, re-add the manual NAT lines if they fail to be loaded when booting 9.1(2).

To remove the static manual NAT line, use the command 'no nat #' where # is the manual NAT line number with the extended keyword.

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
02-JUN-2015
Known Affected Releases:
9.1(2.1)
Known Fixed Releases:
100.10(0.6), 100.8(27.83), 100.8(38.18), 100.8(40.7), 100.8(41.2), 100.8(60.16), 100.9(0.48), 100.9(10.1), 100.9(6.24), 100.9(7.26)
Bug Id:
CSCth58048
Title:
Assert Failure caused Traceback in Thread Name: Dispatch Unit
Description:

Symptom:

ASA experiences a crash due to an Assert Failure. The ASA will generate a crashinfo file and reload.

Conditions:

The 'show crashinfo' output will show a recent traceback in Thread Name: Dispatch Unit. It will also read "Abort: Assert failure".

Workaround:

Unknown

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
8.2(2.17), 8.2(3), 8.2(3.5)
Known Fixed Releases:
100.7(13.15), 100.7(13.65), 100.7(14.1), 100.7(17.5), 100.7(18.1), 100.7(18.9), 100.7(19.8), 100.7(6.42), 100.7(6.62), 100.7(8.34)
Bug Id:
CSCtn08326
Title:
ESMTP Inspection Incorrectly Detects End of Data
Description:

Symptom:

When using Extended Simple Mail Transfer Protocol (ESMTP) Inspection on Adaptive Security Appliance (ASA), certain patterns within e-mails that span multiple TCP segments may cause the inspection engine to incorrectly detect an end-of-data condition and prevent the message from being sent.

Conditions:

ESMTP Inspection enabled.

Workaround:

Disable ESMTP Inspection with no inspect esmtp command.

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
8.2(4), 8.3(2.11), 8.4, 8.4(1)
Known Fixed Releases:
100.7(13.1), 100.7(14.1), 100.7(15.1), 100.7(6.30), 100.7(8.23), 100.7(9.13), 100.8(0.2), 100.8(10.1), 100.8(12.1), 8.0(5.24)
Bug Id:
CSCus92856
Title:
ASA traceback in DATAPATH Thread due to Double Block Free
Description:

Symptom:
ASA reloads and generates crashinfo inThread DATAPATH
Issue is specific to cluster with multi-context and interface sharing. Issue was exposed by fragmentation happening in shared interface

Conditions:
Clustering is enabled on ASA

Workaround:
Avoid using loopback/shared interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
9.1(5)
Known Fixed Releases:
100.11(0.58), 100.12(0.124), 100.13(0.72), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.24), 100.14(7.23), 100.15(0.9)
Bug Id:
CSCtf14727
Title:
ASP table entry causes FW to stop encrypting traffic
Description:

Symptom: The ASA stops encrypting traffic to remote peer.

Conditions:The ASP classify table contains entries with the same user data that match different vpn contexts, leading to spi mis-match.

Workaround:Reload the ASA

Status:
Other
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
8.2(2)
Known Fixed Releases:
Bug Id:
CSCut01856
Title:
ASA dropping traffic with TCP syslog configured in multicontext mode
Description:

Symptom:
ASA dropping traffic in multiple-context mode with TCP syslog server unreachable.

Conditions:
-ASA in multiple context mode
-TCP syslog server configured on one of the contexts.
-"no logging permit host-down" configured on a context.

Workaround:
On removing and adding the context , which is having the issue,back the issue goes away.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
03-JUN-2015
Known Affected Releases:
9.2(2.8)
Known Fixed Releases:
100.11(0.58), 100.12(0.122), 100.13(0.66), 100.13(21.13), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13)
Bug Id:
CSCtk10911
Title:
HA replication code stuck - "Unable to sync configuration from Active"
Description:

Symptom:

Standby ASA is stuck in "Sync Config" and is showing the following messages

Detected an Active mate
Unable to sync configuration from Active

The issue remains after the standby is reloaded or after reconfiguring failover on the standby.

Conditions:

ASA pair configured for failover. Has been seen in 8.1(2) software. This is a rare occurrence.

Workaround:

Reload the active ASA to restore the HA function

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
8.1(2.13)
Known Fixed Releases:
100.5(5.55), 100.7(0.71), 100.7(11.2), 100.7(6.16), 100.7(8.3), 8.2(4.1), 8.2(5), 8.3(2.12), 8.4(1.1), 8.4(1.99)
Bug Id:
CSCuu23104
Title:
ASA: Traceback Unicorn Proxy Thread on version 9.4.1
Description:

Symptom:
ASA Traceback with thread name Unicorn Proxy.

Conditions:
ASA running version 9.4.1

Workaround:
None

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
9.4(1)
Known Fixed Releases:
Bug Id:
CSCut18717
Title:
ASA - Standby traceback in Thread Name: fover_parse
Description:

Symptom:
Standby ASA traceback in thread name fover_parse during upgrade from 8.6.1.12 to 9.0.4.29 after Beginning configuration replication from mate.

Conditions:
ASA is A/S failover pair

Workaround:

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
9.0(4.29)
Known Fixed Releases:
Bug Id:
CSCtq92619
Title:
ASA IPsec doesn't start Quick Mode for some SA with IKEv1 SA up
Description:

Symptom:
ASA may fail to initiate a Phase 2 SA when interesting traffic arrives at the ASA.

Conditions:
ASA 8.4.1.10 Static Lan-to-lan connection that has been up for about 3 weeks.
Phase 1 SA is still established
Phase 2 SA for another line in the same crypto map entry is up and works fine.

Workaround:
- Reload ASA
- Remove crypto map entry and re-enter it.
- Upgrade to a version that includes a fix for CSCty16864 which is caused by
the same underlying issue to resolve the problem.

Status:
Other
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
8.4(1.10), 8.4(2)
Known Fixed Releases:
Bug Id:
CSCud37992
Title:
HTTP Deep Packet Inspection Denial of Service Vulnerability
Description:

Summary

Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability
SQL*Net Inspection Engine Denial of Service Vulnerability
Digital Certificate Authentication Bypass Vulnerability
Remote Access VPN Authentication Bypass Vulnerability
Digital Certificate HTTP Authentication Bypass Vulnerability
HTTP Deep Packet Inspection Denial of Service Vulnerability
DNS Inspection Denial of Service Vulnerability
AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability
Clientless SSL VPN Denial of Service Vulnerability


These vulnerabilities are independent of one other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability, SQL*Net Inspection Engine Denial of Service
Vulnerability, HTTP Deep Packet Inspection Denial of Service Vulnerability, DNS Inspection Denial of Service Vulnerability and Clientless SSL VPN
Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Digital Certificate Authentication Bypass Vulnerability, Remote Access VPN Authentication Bypass Vulnerability,
and Digital Certificate HTTP Authentication Bypass Vulnerability may result in an authentication bypass, which could allow the attacker access to
the inside network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Successful exploitation of the AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability may exhaust available memory, which could
result in general system instability and cause the affected system to become unresponsive and stop forwarding traffic.

Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of the vulnerabilities. This
advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa

Note: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers may be affected by the
SQL*Net Inspection Engine Denial of Service Vulnerability. A separate Cisco Security Advisory has been published to disclose the vulnerabilities
that affect the Cisco FWSM. This advisory is available at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-5512 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Symptom:

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
8.4(4.1)
Known Fixed Releases:
100.10(0.6), 100.7(13.111), 100.7(13.116), 100.7(6.105), 100.7(6.121), 100.8(27.30), 100.8(27.85), 100.8(34.1), 100.8(38.28), 100.8(38.4)
Bug Id:
CSCus70693
Title:
ASA 9.3.2 SSL doesn't work with error: %ASA-4-402123: CRYPTO:
Description:

After upgrade to 9.3.2 SSL VPNs stop working.

Symptom:
SSL (either Web or AnyConnect cannot be establish) with the error from AnyConnect:
"Could not connect to server. Please verify Internet connectivity and server address."

In the DART:
Type : Error
Source : acvpnui

Description : Function: ConnectMgr::run
File: .\ConnectMgr.cpp
Line: 674
Invoked Function: ConnectMgr::initiateConnect
Return Code: -29622263 (0xFE3C0009)
Description: CONNECTMGR_ERROR_UNEXPECTED

This errors are seen:

"%ASA-4-402123: CRYPTO: The ASA hardware accelerator encountered an error (Invalid PKCS Type, Pad, or Length, code= 0x1B) while executing the command PKCS1 v1.5 RSA Decrypt with CRT (> 1024 bits) (0x202)."

These errors are seen while debugs enabled:
RC4-SHA / RC4-MD5
error:1415FFA5:SSL routines:SSL_accept:pkp error@ssl_engine.c:2838

AES256-SHA / AES128-SHA / DES-CBC3-SHA
error:1415FFA5:SSL routines:SSL_accept:pkp error@ssl_engine.c:2639

Tests:
+ AnyConnect 3.1.05160 uses TLS 1.0 - fails
+ AnyConnect 4.0.00057 uses TLS 1.2 - fails
+ with IE TLS 1.0 - fails
+ with IE TLS 1.1/1.2 - fails
+ with Mozilla Firefox TLS 1.0 - fails
but
+ Mozilla Firefox TLS 1.1/1.2 - work ok
+ Chrome also uses TLS 1.2 - works ok.

Conditions:
ASA running 9.3.2 (the issue is not seen on the 9.3.1)

Certificate with:
- RSA keys size: 2048 bits
- Signature Algorithm: sha256RSA
- Signature Hash Algorithm: sha256

It is not happening for all certificates, it has to be something specific in the certificate which hasn't been identified yet.

Workaround:
+ Downgrade
+ try to regenerate the certificate
+ for WebVPN use Firefox/Chrome and TLS 1.2

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
100.12(0.122), 100.13(0.66), 100.13(21.13), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13), 100.14(6.9)
Bug Id:
CSCub08310
Title:
ASA "write standby" fails with "Failed to initialize interface" error
Description:

Symptom:

"write standby" command may fail to synchronize configuration from active ASA to standby ASA. The following error messages may be printed on the standby unit:

Beginning configuration replication from mate.
ERROR: open(np/port/ec/40/10/23/24/25/26/-1/-1/-1/-1/-1/-1/-1/-1/-1/-1/-1/-1) failed.
ERROR: open(Po11) failed.
ERROR: Failed to initialize interface inside
ERROR: Add interface failed.

if "debug fover fail" is enabled. This causes all "nameif" commands being lost from context configuration and standby configuration becomes unsynchronized with active:

Number of interfaces on Active and Standby are not consistent.
If the problem persists, you should disable and re-enable failover
on the Standby.

Conditions:

ASA 8.4(3.9). Exact conditions are not known yet.

Workaround:

Don't use "write standby".

Status:
Terminated
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
8.4(3.9)
Known Fixed Releases:
Bug Id:
CSCus91445
Title:
BGPv6: Error when changing AS Number with ASDM
Description:

Symptom:
When changing the AS Number for BGP routing, a syntax error occurs on the 'router bgp' command. This is the ASDM error:

[OK] no router bgp 109
[ERROR] router bgp 6501

router bgp 6501
^
ERROR: % Invalid input detected at '^' marker.

router bgp 6501

After this, all of the existing BGP configuration is lost and the user will need to reenter it manually.

Conditions:
There is IPv6 configuration for BGP.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
Bug Id:
CSCtt11835
Title:
Traceback in Thread Name: tacplus_snd
Description:

Symptom:
ASA Reloads with Traceback in Thread Name: tacplus_snd

Conditions:
ASA configured to use TACACS+

Workaround:
Do not remove the tacacs server from the configuration while associated tacacs
sessions are active

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
8.4(2)
Known Fixed Releases:
100.7(13.43), 100.7(14.36), 100.7(17.5), 100.7(18.4), 100.7(6.51), 100.7(8.34), 100.8(0.39), 100.8(11.4), 100.8(15.17), 100.8(19.34)
Bug Id:
CSCuu27193
Title:
ASA Traceback in Thread Name: Dispatch Unit
Description:

Symptom:
ASA 5505 running version Traceback in 'Thread Name:Dispatch Unit.

Conditions:
ASA 5505 running version 9.1.6

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
9.1(6)
Known Fixed Releases:
Bug Id:
CSCud70273
Title:
ASA may generate Traceback while running packet-tracer
Description:

Symptom:
A Cisco ASA may crash and generate a traceback when using the packet-tracer feature via the CLI or by
ASDM.

Conditions:
This is seen in very rare situations and does not appear to be easily reproducible. Identifying that you
have hit this crash is not possible without crash analysis. Please refer to the bug details for fixed in
version.

Workaround:
There is no workaround at this time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
8.4(5), 8.6(1.5)
Known Fixed Releases:
100.7(6.115), 100.8(27.63), 100.8(60.3), 100.9(0.37), 100.9(4.5), 100.9(6.12), 100.9(7.19), 8.2(5.42), 8.4(5.102), 8.4(6)
Bug Id:
CSCuu69152
Title:
ASA crash in Thread Name: CP HA Processing.
Description:

Symptom:
ASA failover pair crashing in Thread Name: CP HA Processing.

Conditions:
L2L VPN Tunnel is configured on the ASA

Workaround:
No workaround

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
04-JUN-2015
Known Affected Releases:
9.2(2.8)
Known Fixed Releases:
Bug Id:
CSCte66568
Title:
Double authentication broken in 8.2.2 when use-primary-username is conf.
Description:

Symptom:
AnyConnect fails when double authentication is used.

Conditions:
Discovered using ASA 8.2.2 with double authentication configured under the tunnel group in use.

Workaround:
1) Upgrade the ASA to version 8.4(4)1 or later
2) Downgrade AnyConnect to 3.0.08057
3) Under the tunnel-group settings, go to secondary-authentication-server-group and remove "use-primary-username" from the command (this change will prompt users to enter their username twice when authenticating)
4) Downgrade the ASA to version 8.2(1)

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
8.2, 8.2(2), 8.2(5), 8.3
Known Fixed Releases:
100.4(0.35), 100.7(2.1), 8.2(2.3), 8.2(2.99), 8.2(4), 8.3(0.23), 8.3(1), 8.3(1.100), 8.4(1)
Bug Id:
CSCts48937
Title:
Memory leak in DP udp host logging resulting in 1550 byte blocks leak
Description:

Symptom:
When the command "management-access" is configured, in conjunction with a UDP syslog server destination, the ASA might exhaust the available blocks of memory used for processing traffic; this could cause the ASA to fail to pass traffic or de-stabilize a redundant failover pair of ASAs.

If this problem is encountered, the following syslog might be logged by the ASA:
%ASA-3-3321007: System is low on free memory blocks of size ( CNT out of MAX)

And the output of 'show block' could show the available blocks of a size has gone to 0, like in the output below:
ciscoASA# show blocks
SIZE MAX LOW CNT
0 400 383 400
4 100 98 99
80 403 377 403
256 1200 1165 1195
1550 6479 6384 6476
2048 1200 0 123 <---- Problem here
2560 264 263 264
4096 100 100 100
8192 100 100 100
16384 102 102 102
65536 16 16 16
ciscoASA#

Conditions:
To encounter this problem, all of the following conditions must be met:
1) The ASA must have the command 'management-access' configured, with an interface specified for that access. For example, to enable the management-access feature on the inside interface, the command would be 'management-access inside'
2) The ASA must be configured to send UDP syslogs to a syslog server located out the same interface as defined in the 'management-access' command. For example: 'logging host inside 10.1.2.3'

Workaround:
Remove the management-access command, or disable UDP syslogging.

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
8.3(2), 8.4(1)
Known Fixed Releases:
100.7(13.31), 100.7(14.21), 100.7(18.2), 100.7(6.44), 100.7(8.34), 100.8(0.25), 100.8(10.35), 100.8(12.32), 100.8(15.5), 100.8(19.14)
Bug Id:
CSCua21363
Title:
1550 byte block depletion related to TCP
Description:

Symptom:
Traffic to/through the ASA may slow down or stop.

Conditions:
ASA5585 running special engineering image based on 8.4.3. The 1550 and 4096 byte blocks have intermittently been depleted since loading the new image, thus resulting in a cessation of traffic to/through the device.

Workaround:
None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
8.4(3)
Known Fixed Releases:
100.7(6.90), 100.8(0.210), 100.8(11.33), 100.8(27.19), 100.8(33.16), 100.8(34.1), 100.8(36.2), 100.9(0.1), 100.9(3.2), 8.4(4.4)
Bug Id:
CSCuu42174
Title:
Crypto RSA keys removed from Standby Unit with "wr standby" in Multimode
Description:

Symptom:
RSA keys removed from the ASA Standby unit with "wr standby"

Conditions:
ASA device in Multiple context and Active/Active Failover.

Workaround:
Don't use "wr standby" command from the system context

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
Bug Id:
CSCut71408
Title:
ASA reload when unconfiguring/configuring eigrp and ospf routing process
Description:

Symptom:
ASA reload when unconfiguring/configuring eigrp and ospf routing process

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
100.14(4.31)
Known Fixed Releases:
100.14(4.32), 100.14(6.11), 100.14(7.12), 100.15(1.2), 100.15(2.26), 100.15(3.1), 100.15(4.2), 100.15(5.2), 100.15(6.2)
Bug Id:
CSCut63305
Title:
ASA Observing stale summary route and VRF context create failure
Description:

Symptom:
ASA Observing stale summary route and VRF context create failure

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
100.14(4.27)
Known Fixed Releases:
100.14(4.30), 100.14(6.11), 100.14(7.12), 100.15(1.2), 100.15(2.26), 100.15(3.1), 100.15(4.2), 100.15(5.2), 100.15(6.2)
Bug Id:
CSCut62535
Title:
ASA reload after unconfiguring OSPF and running show run router command
Description:

Symptom:
ASA reload after unconfiguring OSPF and running show run router command

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
100.14(4.27)
Known Fixed Releases:
100.14(4.30), 100.14(6.11), 100.14(7.12), 100.15(1.2), 100.15(2.26), 100.15(3.1), 100.15(4.2), 100.15(5.2), 100.15(6.2)
Bug Id:
CSCut72078
Title:
ASA reload when executing the command clear ipv6 route man all
Description:

Symptom:
ASA reload when executing the command clear ipv6 route man all

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
100.14(4.31)
Known Fixed Releases:
100.14(4.34), 100.14(6.11), 100.14(7.12), 100.15(1.2), 100.15(2.26), 100.15(3.1), 100.15(4.2), 100.15(5.2), 100.15(6.2)
Bug Id:
CSCut06081
Title:
ASA context create fail in multi-mode when IPv4 static route is present
Description:

Symptom:
ASA context create fail in multi-mode when recreating same context again

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
05-JUN-2015
Known Affected Releases:
100.13(0.8)
Known Fixed Releases:
100.14(4.9), 100.14(6.11), 100.14(7.12), 100.15(1.2), 100.15(2.26), 100.15(3.1), 100.15(4.2), 100.15(5.2), 100.15(6.2)
Bug Id:
CSCuq26046
Title:
ASA - Traceback in thread name SSH while changing NAT configuration
Description:

Symptom:
ASA traceback in thread name SSH during NAT reconfiguration.

Conditions:
ASA running 8.4.7.15.

Workaround:
Not known.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-JUN-2015
Known Affected Releases:
8.4(7.15)
Known Fixed Releases:
100.11(0.43), 100.12(0.34), 100.12(10.31), 100.12(15.9), 100.12(21.1), 100.12(6.3), 100.12(9.11), 100.7(6.134), 100.8(40.82), 8.4(7.23)
Bug Id:
CSCur69803
Title:
acl rules are not removed when service object-group entry is deleted.
Description:

Symptom:
ACL rules are not removed when service object-group entry is deleted.

Conditions:
This problem occurs when object-group-search access-control is enabled.

Workaround:
1) Remove the access-list and reapply it.
2) Remove the object-group-search access-control
3) Reload or reboot the device.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
06-JUN-2015
Known Affected Releases:
100.12(0.82), 9.1
Known Fixed Releases:
100.11(0.54), 100.12(0.99), 100.12(23.4), 100.12(24.4), 100.12(30.2), 100.13(0.11), 100.13(1.6), 100.13(11.20), 100.13(12.42), 100.13(16.18)
Bug Id:
CSCut86775
Title:
VPN traceback due to memory corruption
Description:

Symptom:
ASA with WebVPN portal crashes

Conditions:
Not yet fully known

Workaround:
None

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
07-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.2)
Known Fixed Releases:
Bug Id:
CSCut28210
Title:
AAA: RSA/SDI integration failing with ASA 9.3(2) - node secret issue
Description:

Symptom:
Unable to authenticate with SDI authentication server(RSA Authentication Manager)
Ex. "no response from authentication server" with [Test] in AAAServer Group on ASDM.

Conditions:
-Using RSA Authentication Manager 8.1 or 6.1 as AAA server with ASA 9.3(2)
-The issue does NOT appear on ASA 9.2(2)8 or ASA 9.3(1)

Workaround:
-Using ASA 9.2(2)8.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
07-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
100.12(0.117), 100.13(0.54), 100.13(21.10), 100.14(0.4), 100.14(1.4), 100.14(10.7), 100.14(11.7), 100.14(2.10), 100.14(26.4), 100.14(3.4)
Bug Id:
CSCts50723
Title:
ASA: Builds conn for packets not destined to ASA's MAC in port-channel
Description:

Symptom:

When the ASA is configured with a port-channel interface, the firewall may process and build conns for packets not destined to its interface MAC address that are received on that port-channel. In certain scenarios, this could cause flooded packet storms in the network.

Conditions:

The ASA must be configured with all of the following conditions:

1) At least 1 port-channel interface
2) The 'same-security-traffic permit intra-interface' command

Workaround:

If the ASA does not need to hairpin traffic, disable 'same-security-traffic permit intra-interface'.

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
8.4(2)
Known Fixed Releases:
100.7(13.95), 100.7(13.96), 100.7(6.90), 100.7(6.92), 100.8(0.228), 100.8(11.35), 100.8(11.49), 100.8(27.19), 100.8(27.25), 100.8(33.19)
Bug Id:
CSCui25105
Title:
ASA may stop hashing and stop redirecting traffic to WCCP servers
Description:

Symptom:
An ASA configured to redirect WCCP traffic to a WCCP caching server such as the Ironport WSA web filter, may stop redirecting traffic. Further investigation shows that the ASA fails to hash the incoming traffic to any WCCP bucket and therefore processes the traffic without redirecting it per configuration.

Conditions:
This has been seen while running ASA code versions 9.1(1) and 9.1(2) but very well may exist with other code versions. Current information indicates it may have something to do with utilizing more than one caching server, but details in that regard are inconclusive.

Workaround:
None at this time.

More Info:
You can check to see if you are hitting this condition by looking at the output of 'show wccp detail' and looking for the State to show as 'Usable' and the 'Hash Allotment' as 0% for all servers. For example:


ASA# sh wccp detail
WCCP Cache-Engine information:
Web Cache ID:
Protocol Version: 2.0
State: Usable
Initial Hash Info: 00000000000000000000000000000000
00000000000000000000000000000000
Assigned Hash Info: 00000000000000000000000000000000
00000000000000000000000000000000
Hash Allotment: 0 (0.00%)
Packets Redirected: 0
Connect Time: 1w0d
Web Cache ID:
Protocol Version: 2.0
State: Usable
Initial Hash Info: 00000000000000000000000000000000
00000000000000000000000000000000
Assigned Hash Info: 00000000000000000000000000000000
00000000000000000000000000000000
Hash Allotment: 0 (0.00%)
Packets Redirected: 0
Connect Time: 1w0d

Status:
Terminated
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
9.1(1), 9.1(2)
Known Fixed Releases:
Bug Id:
CSCuh25271
Title:
Upgrade fails w/ msg "No Cfg structure found in downloaded image file."
Description:

Symptom:
Upgrade fails with error message "No Cfg structure found in downloaded image file."

Conditions:
Upgrade from version without fix for CSCua99091 (e.g. 9.1.1) to image with fix for CSCud21312 (e.g. 9.1.2.2).

Workaround:
If the customer is running an image without the fix for CSCua99091 (e.g. 8.4.4, 9.1.1) then the customer needs to do an intermediate upgrade to a version that includes the fix for CSCua99091 (e.g. 8.4.6, 9.1.2) and then upgrade to the desired image (e.g. 9.1.2.2)

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
8.2(0), 8.4(0.1), 8.5(1), 8.6(0), 9.0(1), 9.1(1), 9.1(1.1), 9.1(2.1)
Known Fixed Releases:
Bug Id:
CSCur06331
Title:
ASA Traceback with spin_lock in DATAPATH
Description:

Symptom:
Hardware : ASA5585-SSP-60
Software : 9.1(4)5
Problem Description : ASA Traceback with spin_lock in DATAPATH

Conditions:
N/A

Workaround:
N/A

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
9.1(4.5)
Known Fixed Releases:
Bug Id:
CSCtl44287
Title:
Routing:Traceback observed on standby unit when exec clear conf all
Description:

Symptom:
=========
Traceback observed on standby unit when exec clear conf all

Condition
===========
When I am doing a clear conf all on the primary active unit, I am observing a
crash on the secondary standby unit.Enable the telnet access on mgmt interface
and configure the dns server parameters.Launch the telnet console using mgmt ip
and then do a ping tcp 23. Do clear conf all from the
console, Observing traceback on the stanbdy unit

Other simple senario is, do "clear conf interface" on the ASA Primary and copy
the old running cfg from the flash to running-config. Traceback is observed on
the secondary unit.

Work around
==========
None

Conditions:

Workaround:

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
8.4(0.120)
Known Fixed Releases:
Bug Id:
CSCut28217
Title:
Active ASA in failover setup reboots on its own
Description:

Symptom:
Active ASA in failover setup reboots on its own.

Conditions:
Active ASA in failover setup reboots on its own.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
9.0(4)
Known Fixed Releases:
100.11(0.58), 100.12(0.120), 100.13(0.62), 100.13(21.12), 100.13(28.2), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11), 100.14(2.21)
Bug Id:
CSCus32005
Title:
ASA - Traceback in thread name SSH while applying BGP show commands
Description:

Symptom:
ASA traceback in thread name SSH during performing BGP show commands.

Conditions:
ASA running 9.2.2.4

Workaround:
not known

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
9.2(2.4)
Known Fixed Releases:
100.11(0.57), 100.12(0.118), 100.13(0.56), 100.13(21.10), 100.14(0.5), 100.14(1.4), 100.14(10.8), 100.14(11.8), 100.14(2.12), 100.14(26.4)
Bug Id:
CSCua36443
Title:
ASA may reload with traceback in IPsec message handler
Description:

Symptom:
ASA may generate a traceback and reload in the IPsec message handler
Conditions:
The issue has been seen on ASA 8.4(4), other versions may also be affected
Workaround:
No known workaround at this time

Status:
Other
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
8.4(0.4)
Known Fixed Releases:
Bug Id:
CSCum77083
Title:
traceback in Thread Name: IKEv2 Daemon
Description:

Symptom:
ASA reloads with Thread Name: IKEv2 Daemon

Conditions:
ASA running 9.1 or later code and configured to terminate IKEv2 connections.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
100.8(38.104)
Known Fixed Releases:
100.10(9.5), 100.11(4.1), 100.8(38.114), 100.8(40.60), 100.8(56.20), 100.8(62.2), 100.8(64.1), 100.8(65.3), 100.8(66.3), 100.8(67.1)
Bug Id:
CSCtt36737
Title:
AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability
Description:

Summary
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability
SQL*Net Inspection Engine Denial of Service Vulnerability
Digital Certificate Authentication Bypass Vulnerability
Remote Access VPN Authentication Bypass Vulnerability
Digital Certificate HTTP Authentication Bypass Vulnerability
HTTP Deep Packet Inspection Denial of Service Vulnerability
DNS Inspection Denial of Service Vulnerability
AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability
Clientless SSL VPN Denial of Service Vulnerability


These vulnerabilities are independent of one other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability, SQL*Net Inspection Engine Denial of Service
Vulnerability, HTTP Deep Packet Inspection Denial of Service Vulnerability, DNS Inspection Denial of Service Vulnerability, and Clientless SSL
VPN Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Digital Certificate Authentication Bypass Vulnerability, Remote Access VPN Authentication Bypass Vulnerability,
and Digital Certificate HTTP Authentication Bypass Vulnerability may result in an authentication bypass, which could allow the attacker access to
the inside network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Successful exploitation of the AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability may exhaust available memory, which could
result in general system instability and cause the affected system to become unresponsive and stop forwarding traffic.

Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of the vulnerabilities.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa

Note: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers may be affected by the
SQL*Net Inspection Engine Denial of Service Vulnerability. A separate Cisco Security Advisory has been published to disclose the vulnerabilities
that affect the Cisco FWSM. This advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/6.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-3415 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
8.4(2.1), 8.6(1)
Known Fixed Releases:
100.7(13.43), 100.7(13.65), 100.7(14.37), 100.7(17.7), 100.7(18.4), 100.7(18.9), 100.7(19.8), 100.7(6.52), 100.7(6.62), 8.4(2.102)
Bug Id:
CSCun00055
Title:
ASA: ASA 5585 Tracebacks in Datapath
Description:

Symptom:
ASA 5585 tracebacks is Datapath

Conditions:
Root cause is unknown for this crash.

Workaround:
No Workarounds as of now.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
9.0(2)
Known Fixed Releases:
Bug Id:
CSCuh69931
Title:
ASA 5512 - 9.1.2 Traceback in Thread Name: ssh
Description:

Symptom:
ASA SSHv2 rekey causes traceback.

Conditions:
ASA SSHv2 rekey occurs after data or time (55 minutes) trigger. If the connection is closing while this is ongoing, a traceback will occur.

Workaround:
none at this time.

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
9.1(2)
Known Fixed Releases:
100.8(27.84), 100.8(38.21), 100.8(40.10), 100.8(41.2), 100.8(60.26), 100.9(0.53), 100.9(10.1), 100.9(6.28), 100.9(7.33), 9.1(2.5)
Bug Id:
CSCuf93071
Title:
ASA 8.4.4.1 traceback in threadname Datapath
Description:

Symptom:
ASA5585-SSP-60 running 8.4.4.1 crashed in threadname 'datapath'

Conditions:

Workaround:
Disable IPS.

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
8.2, 8.4(3.10), 8.4(4.1)
Known Fixed Releases:
100.10(0.6), 100.7(6.120), 100.8(27.85), 100.8(38.23), 100.8(40.13), 100.8(41.2), 100.8(60.30), 100.9(0.54), 100.9(10.1), 100.9(6.29)
Bug Id:
CSCuo95074
Title:
ASA AnyConnect failure or crash in SSL Client compression with low mem
Description:

Symptom:
AnyConnect clients are able to connect, but get immediately disconnected. The following are seen in syslogs:

%ASA-6-725007 SSL session with remote_device interface_name : IP_address / port terminated.
%ASA-6-722023: Group group User user-name IP IP_address SVC connection terminated with compression
%ASA-6-716058: Group group User user IP ip AnyConnect session lost connection. Waiting to resume.
%ASA-5-722037: Group group User user-name IP IP_address SVC closing connection: Compression error.
%ASA-6-722027: Group group User user-name IP IP_address SVC decompression history reset
%ASA-6-716059: Group group User user IP ip AnyConnect session resumed. Connection from ip2 .
%ASA-3-722021: Group group User user-name IP IP_address Unable to start compression due to lack of memory resources

ASA can also crash with traceback pointing to "ssl_compress_record" when low memory is observed.

Conditions:
Compression is configured for AnyConnect.

Workaround:
Disable compression for AnyConnect.
Downgrade to 8.4.6.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
9.2(1)
Known Fixed Releases:
100.10(17.2), 100.10(2.26), 100.10(7.13), 100.11(0.17), 100.11(5.21), 100.11(6.1), 100.12(11.9), 100.12(12.1), 100.12(15.2), 100.12(8.5)
Bug Id:
CSCto59377
Title:
Traceback in Thread Name: DATAPATH-6-2319
Description:

Symptom:
ASA reloads with traceback in Thread Name: DATAPATH-6-2319

Conditions:
First observed on ASA5585 platform under stress test

Workaround:
None

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
100.8, 100.8(5.2), 8.4(1.6), 8.4(7.23)
Known Fixed Releases:
Bug Id:
CSCuu29947
Title:
ASA: Traceback in Dispatch Unit
Description:

Symptom:
ASA caused a traceback in dispatch unit running 8.4.7.23

Conditions:
unknown at this point

Workaround:
N/A

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
8.4(7.23)
Known Fixed Releases:
Bug Id:
CSCut91972
Title:
RAMC: Traceback while bring up RA with IPv4 DTLS Certs
Description:

Symptom:
Crash when attempt Anyconnect DTLS Connection with Cert authentication

Conditions:
Crash when attempt Anyconnect DTLS Connection with Cert authentication

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
10-JUN-2015
Known Affected Releases:
100.15(2.14)
Known Fixed Releases:
100.15(2.20)
Bug Id:
CSCte21219
Title:
Certificate authentication failing on ASA: incorrect key for validation
Description:

Symptom:

When using IPSEC or SSL and using certificate validation of the clients that are connecting to the ASA, validation will fail.

Errors similar to the following may be seen in the ca debugs:

CERT-C: I pkixpath.c(1137) : Error #72eh
CRYPTO_PKI: Certificate validation: Failed, status: 1838. Attempting to retrieve revocation status if necessary

CRYPTO_PKI: PKI Verify Certificate Check Cert Revocation unknown error 1838

Conditions:

2 CA certificates installed in trustpoints used with vaildation that the same CN but use a different RSA key for each certificate.

Workaround:


Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
8.2(1)
Known Fixed Releases:
100.4(0.35), 100.7(2.1), 8.0(5.10), 8.2(2.5), 8.2(2.99), 8.2(4), 8.3(0.21), 8.3(1), 8.4(1)
Bug Id:
CSCuq47586
Title:
Standby ASA reboots when write standby is used on the active ASA
Description:

Symptom:
standby ASA crashes when write standby is used from active ASA

Conditions:
ASA in failover pair, make a configuration change to one of the contexts, issue the write standby command, standby ASA crashes and reboots

Workaround:
use write memory instead

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
9.2(1)
Known Fixed Releases:
Bug Id:
CSCub59136
Title:
ASA: Manual NAT rules are not processed in order
Description:

This bug identifies the same problem as CSCtq47028. CSCtq47028 is listed as resolved, but did not in fact resolve this problem, hence this bug is filed to continue to track it.

Symptom:
In ASA 8.3 and later, Manual NAT rules (Section 1) may not be processed in the order they appear in the output of show running-config nat and show nat. In certain cases, a rule which performs a translation between 2 objects/object-groups will take precedence over a rule that does not perform any translation.

Conditions:
The ASA must be running a software version of 8.3 or higher. The following is an example of an affected configuration:

object-group network src-networkA
network-object 10.1.1.0 255.255.255.0
object-group network src-networkB
network-object 10.2.2.0 255.255.255.0
object-group network dst-networkA
network-object 192.168.1.0 255.255.255.0
object network dst-hostA
host 172.16.1.1
object network obj_any
subnet 0.0.0.0 0.0.0.0
!
nat (inside,outside) source static src-networkA src-networkA destination static dst-networkA dst-networkA
nat (inside,outside) source dynamic src-networkA interface destination static obj_any dst-hostA

In the above example, a packet with a source of a host in src-networkA and a destination of a host in dst-networkA will NOT be processed by the 1st line, and instead will match the 2nd line and be translated.

Workaround:
As a workaround, NAT rules can be modified to prevent this condition by avoiding re-using objects/object-groups in a single rule. Using the above example, the NAT rules could be changed to the following, thereby causing the 1st NAT rule to be applied to the previously indicated traffic flow:

object-group network src-networkA-mapped
network-object 10.1.1.0 255.255.255.0
object-group network dst-networkA-mapped
network-object 192.168.1.0 255.255.255.0
nat (inside,outside) source static src-networkA src-networkA-mapped destination static dst-networkA dst-networkA-mapped
nat (inside,outside) source dynamic src-networkA interface destination static obj_any dst-hostA

Notice that no object/object-group is re-used within the same rule. This will force the ASA to process the NAT rules in the order they appear in the configuration.

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
100.7(21.1), 8.4(2), 8.4(4.2), 8.4(4.3), 8.4(4.5)
Known Fixed Releases:
100.7(13.98), 100.7(6.94), 100.8(0.235), 100.8(11.37), 100.8(27.19), 100.8(33.21), 100.8(34.1), 100.8(37.7), 100.8(39.1), 100.9(0.1)
Bug Id:
CSCui86820
Title:
ASA - Some redirected CWS tower traffic being sent to actual server
Description:

Symptom:
ASA running scansafe inspection will redirect http traffic to the tower as part of the filtering. All communication to the site should be passed through the tower. When the ASA receives a partial packet and is unable to reassemble, the ASA ends up sending the request back to the server instead of the scansafe tower which can cause performance problems on the http download.

Conditions:
- ASA running 9.x code with scansafe inspection enabled.
- Large http downloads with possible packet loss involved in the internet

Workaround:
none at this time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
10-JUN-2015
Known Affected Releases:
9.1(1), 9.1(1.8), 9.1(2), 9.1(3)
Known Fixed Releases:
100.10(0.19), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.8(38.43), 100.8(40.26), 100.8(41.2), 100.8(45.4), 100.8(46.5), 100.8(48.1)
Bug Id:
CSCsq68617
Title:
High CPU caused by the radius_snd process if AAA server is down or slow
Description:








Symptom:

ASA5540 shows high CPU around 90%

Conditions:
The appliance is receiving a discrete number of EzVPN concurrent requests. The authentication is performed via radius server and the AAA server is down or not reachable

Workaround:
none

Further Problem Description:












Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
8.0(2), 8.0(3), 8.0(3.15)
Known Fixed Releases:
7.2(4.31), 8.0(4.5), 8.0(5), 8.1(1.100), 8.1(101.4), 8.2(0.140)
Bug Id:
CSCuo00904
Title:
ASA Page Fault: Invalid Permission in thread name DATAPATH
Description:

Symptom:
The Adaptive Security Appliance(ASA) reloads with thread name DATAPATH with a page fault of Invalid permission.

Conditions:
ASAsm running 8.5.1.16 code.

Workaround:
None at this time.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
8.5(1.16)
Known Fixed Releases:
100.10(0.88), 100.10(2.14), 100.10(6.16), 100.10(7.3), 100.11(0.6), 100.11(4.1), 100.11(5.1), 100.7(6.131), 100.8(40.68), 100.8(56.49)
Bug Id:
CSCui45340
Title:
ASA-SM assert traceback in timer-infra
Description:

Symptom:
ASA Service Module crashes during normal operation. A show crash will be generated and can be used in correlation with other other information gathered by TAC to denote this defect.

Conditions:
ASA Service Module in production on 8.5.1.7.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
8.5(1.7)
Known Fixed Releases:
100.10(0.26), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.7(6.124), 100.8(38.56), 100.8(40.33), 100.8(45.7), 100.8(46.28), 100.8(52.2)
Bug Id:
CSCuj79509
Title:
ASA Physical Interface Failure Does not Trigger Failover
Description:

Symptom:
ASA Failover pair, a physical interface went down, yet no failover happened.

Conditions:
-- Physical interface configured with nameif IP address and security level (issue also affects port channel interfaces).
-- Interface monitored (physical interfaces and port channel interfaces are monitored by default).
-- Failed interface does not have a standby IP configured.

Workaround:
-- configure standby IP (recommended configuration) however this may not be applicable for outside interfaces if no standby public IP is available.
-- monitor VLAN interface associated with the physical interface (if configured).

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
8.2(5.3), 8.4(2.1), 9.0(1), 9.1(1)
Known Fixed Releases:
100.10(0.42), 100.10(1.21), 100.10(2.3), 100.10(3.1), 100.10(9.1), 100.8(38.70), 100.8(40.46), 100.8(46.40), 100.8(51.8), 100.9(10.17)
Bug Id:
CSCut56198
Title:
Clustering: Traceback in DATAPATH with transparent FW
Description:

Symptom:
ASA traceback occurred on one of the slave units in a 4 node cluster in the DATAPATH thread. Stack trace indicates that the ASA was doing a transparent firewall operation.

Conditions:
Cisco ASA running release 9.2.1.213 and configured as a cluster slave with multi-context configuration which included mixed-mode contexts.

Workaround:
None

Further Problem Description:
Please see Eng-note.

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
9.2(1.213), 9.3(2.108)
Known Fixed Releases:
100.11(0.57), 100.11(0.58), 100.12(0.120), 100.12(0.121), 100.13(0.61), 100.13(21.12), 100.13(21.13), 100.13(28.2), 100.14(0.7), 100.14(0.8)
Bug Id:
CSCue51351
Title:
ASA: Huge NAT config causes traceback due to unbalanced p3 tree
Description:

Symptom:
ASA running 8.4(4)9 version code may generate a traceback with Thread Name: DATAPATH-7-2315 and reload.

Conditions:
Observed on ASA5585-SSP-60 running in failover environment.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
8.4(4.9), 8.4(5), 9.1(2), 9.2(2.4), 9.2(2.8)
Known Fixed Releases:
100.10(0.99), 100.10(12.10), 100.10(17.1), 100.10(2.20), 100.10(7.10), 100.11(2.1), 100.11(4.1), 100.8(38.114), 100.8(40.59), 100.8(55.1)
Bug Id:
CSCut49034
Title:
ASA: High CPU on standby due to RDP conn to AC client from CL SSL portal
Description:

Symptom:
CPU on standby ASA spikes to 100%

Conditions:
Host (connecting through clientless VPN with RDP plugin)rdp to a host connected through anyconnect VPN.
Stateful failover configured on an active-standby failover pair.

Workaround:
None

Further Problem Description:
High CPU on standby ASA unit due to a specific connection on the ASA from a host connecting to clientless VPN when stateful failover is enabled.
Host (connecting through clientless VPN )rdp to a host connected through anyconnect VPN.

When this particular connection goes through the ASA, we find that the active ASA builds a single connection.
standby ASA builds numerous connections with same source and destination ports.
Connection on the primary/active:
act/pri/alan3usv01# sh conn all add 66.241.60.197 | i 3389
TCP outside 10.145.44.253:3389 NP Identity Ifc 66.241.60.197:62481, idle 0:00:00, bytes 4131029, flags UO
Connections on secondary:(close to 2500)
stby/sec/alan3usv01# sh conn all add 66.241.60.197 | i 3389
TCP outside 10.145.44.253:3389 NP Identity Ifc 66.241.60.197:62481, idle 0:00:05, bytes 4131029, flags UO
TCP outside 10.145.44.253:3389 NP Identity Ifc 66.241.60.197:62481, idle 0:00:06, bytes 4131029, flags UO

We see a lot of connection teardown on the standby for this connection.
Mar 18 2015 22:12:34: %ASA-6-302014: Teardown TCP connection 27554151 for outside:10.145.44.253/3389(LOCAL\statiajj) to identity:66.241.60.197/10994 duration 0:05:02 bytes 252687 TCP Reset-O
Mar 18 2015 22:12:34: %ASA-6-302014: Teardown TCP connection 27554254 for outside:10.145.44.253/3389(LOCAL\statiajj) to identity:66.241.60.197/10994 duration 0:05:01 bytes 252687 TCP Reset-O

We also see a lot of reset packets in asp drops in the standby ASA.
1: 19:00:25.358578 0000.0000.0000 0000.0000.0000 0x0800 Length: 54
66.241.60.197.62481 > 10.145.44.253.3389: R [tcp sum ok] 0:0(0) ack 0 win 0 (ttl 255, id 52738)
Drop-reason: (mp-svc-no-channel) SVC Module does not have a channel for reinjection
The interesting thing is the source MAC and the destination MAC is 0 in this ASP drop.

We see overruns on the failover interface of the standby unit.
stby/sec/alan3usv01# show int gig0/3
Interface GigabitEthernet0/3 "failover1", is up, line protocol is up
Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec
Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)
Input flow control is unsupported, output flow control is off
Description: LAN/STATE Failover Interface
MAC address 5475.d091.518f, MTU 1500
IP address 10.99.101.114, subnet mask 255.255.255.248
432217782 packets input, 556229026142 bytes, 0 no buffer
Received 556 broadcasts, 0 runts, 0 giants
204523310 input errors, 0 CRC, 0 frame, 204523310 overrun, 0 ignored, 0 abort
And we see a lot of packets being transferred from active to standby ASA.

In the failover debugs we only find the following messages in the debugs of fover rx.
lu_rx: HA TRANS: receive message for client vpnfo, length 48
lu_rx: HA TRANS: receive message for client vpnfo, length 72
lu_rx: HA TRANS: receive message for client vpnfo, length 72

The CPU profiler points that the high CPU on the standby ASA is due to LU updates when we decode the CPU profile output from the standby ASA.

Status:
Open
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
9.1(2), 9.1(5.21)
Known Fixed Releases:
Bug Id:
CSCut12311
Title:
Traceback in DATAPATH Thread with SFR Redirection Enabled
Description:

Symptom:
Adaptive Security Appliance (ASA) unexpectedly reloads when FirePOWER services module traffic redirection is enabled and certain fragmented traffic is received.

Conditions:
Traffic is redirected to FirePOWER services module.

Workaround:
Disable traffic redirection to FirePOWER services module.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
9.3
Known Fixed Releases:
Bug Id:
CSCut45114
Title:
2048-byte block leak if DNS server replies with "No such name"
Description:

Symptom:
The ASA may become responsive due to excessive loss of 2048-byte memory blocks.

Conditions:
Many DNS lookups for bad hostnames are done from the ASA, so that the DNS server replies "no such name".

Workaround:
A reboot is required to recover the lost memory blocks.

Further Problem Description:
To monitor block utilization, use the CLI command "show blocks".

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
9.3(2.101)
Known Fixed Releases:
100.11(0.57), 100.12(0.118), 100.13(0.58), 100.13(21.10), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13), 100.14(26.5)
Bug Id:
CSCuu55258
Title:
ASA 9.4: very slow RX speed for SFR module
Description:

Symptom:
Low transfer speed from SFR module, causing failure when applying SFR policy.

Conditions:
Running ASA 9.4

Workaround:
Use ASA9.3 or 9.2 code.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
9.4, 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur07369
Title:
SXP Version Mismatch Between ASA & N7K with clustering
Description:

Symptom:
SXP connection cannot be established when ASA cluster is interacting with a SXP peer running SXP version 1 protocol.

Conditions:
(1) ASA is running cluster with 2 or more units and (2) SXP peer is running SXP version 1 protocol and (3) SXP peer hash the SXPv1 request from the SXP peer to reach the slave unit of the ASA instead of the master unit.

Workaround:
- Upgrade SXP peer to run SXP version 2 or above, or
- Change the IP address used for establishing SXP connection so that the hash algorithm may direct the SXPv1 request from the SXP peer to the master unit of the ASA cluster instead of the slave unit.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
9.3(1)
Known Fixed Releases:
Bug Id:
CSCty96930
Title:
ASA5585 SSP-60: 8.4.2 Crash thread accept/http on capture command
Description:

Symptom:
ASA5585 running 8.4.2 may crash while configuring capture command.

Conditions:
Still under investigation

Workaround:
Do not use the "capture cap access-list greg interface inside" command

Status:
Terminated
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
8.4(2)
Known Fixed Releases:
Bug Id:
CSCtg14086
Title:
ASA traceback with no traffic going through
Description:

Symptom:

ASA reloads

Conditions:

This has been seen on 5580-40 running 8.2.2

Workaround:

None at this time.

Status:
Other
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
8.2(2)
Known Fixed Releases:
Bug Id:
CSCtb35842
Title:
traceback eip:lavg_dp_work+1 at slib/loadavg.c:241 with vpn & failover
Description:








Symptom:
Traceback may occur with VPN, faiover and high session count






Conditions:





Workaround:
None



Further Problem Description:












Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
100.5(0.22), 100.5(0.24)
Known Fixed Releases:
8.0(4.100), 8.0(4.45), 8.1(2.35), 8.2(1.100), 8.2(1.102), 8.2(1.12), 8.2(4), 8.3(0.0)
Bug Id:
CSCtb45354
Title:
ASA traceback thread name dispatch unit, assertion calendar_queue.h
Description:


Symptom:

ASA traceback on thread name Dispatch Unit, abort Assert failure

Conditions:

On a failover environment, the standby unit is the one seen that crashes

Workaround:

No known workaround


Further Problem Description:





Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
8.0(4.39), 8.2(2)
Known Fixed Releases:
100.4(0.30), 8.0(5.6), 8.1(2.39), 8.2(2.1), 8.2(2.99), 8.2(4), 8.3(0.19), 8.3(1)
Bug Id:
CSCua24960
Title:
Traceback in CP Midpath Processing - SSL DHE cipher
Description:

Symptom:

Upgrade to 8.4.4 causes a traceback in a failover pair of 5585's

Conditions:

Upgrade from 8.3.4

Workaround:

none at this time

Status:
Fixed
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
8.4(4)
Known Fixed Releases:
100.7(23.1), 100.7(6.83), 100.8(34.1), 8.4(4.2), 8.4(4.99), 8.4(5)
Bug Id:
CSCus73993
Title:
ASA memory corruption - traceback in Thread Name: CERT API
Description:

Symptom:
ASA Traceback in Thread Name: CERT API due to memory corruption.

Conditions:
ASA running affected software.

Workaround:
Unknown

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
11-JUN-2015
Known Affected Releases:
9.1(5.21)
Known Fixed Releases:
Bug Id:
CSCtj11690
Title:
Packet-tracer not working in Multi Routed mode
Description:

Symptom:
When running the packet-tracer command in a multi context ASA configuration, the below action is seen even though if the actual packet is allowed.

Action: drop
Drop-reason: (ifc-classify) Virtual firewall classification failed

Conditions:
Multicontext ASA with or without shared interfaces.

Workaround:
None at this time. This is a cosmetic issue only. Traffic is not affected by this bug.

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
100.7(5.20), 7.2(2), 8.4(0.15)
Known Fixed Releases:
100.5(5.43), 100.7(0.59), 100.7(5.23), 100.7(6.8), 100.7(8.1), 100.7(9.1), 8.2(4.101), 8.2(4.6), 8.2(5), 8.3(2.14)
Bug Id:
CSCto06207
Title:
Pre-filled Username From Certificate Denial of Service Vulnerability
Description:

Symptom:
A vulnerability exists within the prefilling username from the certificate function of the Cisco ASA that may allow an authenticated remote
attacker to trigger the reload of the affected system.
The vulnerability is due to improper freed of the memory of the calling process. An attacker may be able to trigger this race condition by trying
to generate multiple Anyconnect sessions.


Conditions:
ASA configured with Anyconnect and certificate authentication.
Additionally, pre-fill username option should be also active for the crash to happen.

Workaround:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.3/5.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2012-5410 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
8.4(1)
Known Fixed Releases:
100.7(13.13), 100.7(14.1), 100.7(17.5), 100.7(18.1), 100.7(6.42), 100.7(9.39), 100.8(0.31), 100.8(0.9), 100.8(10.9), 100.8(15.1)
Bug Id:
CSCul05079
Title:
ASA Memory usage in a context rises
Description:

Symptom:
In ASA running multi-context mode, the reported memory usage in at least one of contexts rises steadily, even though system context doesn't show any new allocations/changes.

Conditions:
Multi-context mode

Workaround:
None currently

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
9.1(3)
Known Fixed Releases:
100.10(9.6), 100.11(0.3), 100.8(38.130), 100.8(40.66), 100.8(56.35), 100.8(64.9), 100.8(65.4), 100.8(66.8), 9.1(5.13), 9.2(0.101)
Bug Id:
CSCtx58556
Title:
ActiveX RDP Plugin fails to connect from IE6-9 after upgrade to 8.4(3)
Description:

Symptom:

After an upgrade to 8.4(3), Windows XP/7 users are unable to connect to an RDP resource using the RDP ActiveX plugin via the WebVPN portal page in IE6-9.

Conditions:

Customer must be using ASA 8.4(3) and Internet Explorer with the RDP ActiveX plugin.

Workaround:

- Use the Java Plugin. This can be accomplished by adding '?ForceJava=yes' to the end of the RDP bookmark. For instance 'rdp://myterminalserver/?ForceJava=true'.
- You can also use Firefox/Chrome to force the use of Java RDP plugin.
- Downgrade to 8.4(2)x and remove the ActiveX plugin from Internet Explorer. You will also need to remove references to the ActiveX plugin from your Windows Registry. You can reference bug ID CSCtx57453 for further information. After removing the ActiveX plugin and cleaning up the registry, reconnect to the ASA 8.4(2)x to re-download the ActiveX plugin.

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
8.4(3)
Known Fixed Releases:
100.7(13.57), 100.7(18.10), 100.7(19.8), 100.7(6.63), 100.8(0.61), 100.8(11.10), 100.8(14.8), 100.8(24.32), 100.8(30.6), 100.8(32.3)
Bug Id:
CSCtn69856
Title:
Memory Block Leak Denial of Service Vulnerability
Description:

Symptom:
A vulnerability exists within the IPSec error handling code of Cisco ASA where a remote authenticated attacker may be able to trigger a memory
block leak by sending crafter fragmented packets.


Conditions:
ASA configured with IPsec and IPsec tunnel active

Workaround:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.3/5.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2012-5047 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
12-JUN-2015
Known Affected Releases:
8.2(4), 8.4(1)
Known Fixed Releases:
100.7(13.89), 100.7(6.86), 100.8(0.192), 100.8(11.30), 100.8(27.19), 100.8(33.13), 100.8(34.1), 100.8(35.2), 100.8(36.1), 100.9(0.1)
Bug Id:
CSCus56590
Title:
ASA - Traceback in Thread Name: fover_parse
Description:

Symptom:
Standby ASA would enter a boot loop after attempting to replicate the configuration from the Active member, generating a Trace back with the name :
fover_parse


Standby ASA finishes the bulk sync in failover but never gives "sync config finished " message to active, this is the point where it reloads.

Conditions:
ASA with failover

Versions : 9.3.2 and 9.4.1

Workaround:
Go in to version 9.3.1, 9.3.2.104

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
9.3(2), 9.4(1)
Known Fixed Releases:
100.11(0.57), 100.12(0.118), 100.13(0.58), 100.13(21.11), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13), 100.14(26.5)
Bug Id:
CSCtn90643
Title:
Traceback while replicating xlates on standby
Description:

Symptom:
Standy ASA has problem replicating nat pool xlates and then tracebacks.

Conditions:
Cisco ASA 5585 running release 8.4.1. Large number of nat translations and heavy load of TCP and UDP data connections on active unit.

Workaround:
None.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2012-5420 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
12-JUN-2015
Known Affected Releases:
8.4(1)
Known Fixed Releases:
100.7(13.1), 100.7(13.3), 100.7(14.1), 100.7(15.1), 100.7(15.3), 100.7(6.33), 100.7(6.38), 100.7(8.26), 100.7(8.34), 100.7(9.18)
Bug Id:
CSCta46747
Title:
Traceback while executing show run after modifying the access-list
Description:

Symptom:

After modifying the access-list using ASDM or CLI, if customer is trying to
view the access-list in another ASDM or CLI session, the ASA may crash.

Conditions:

ASA5500 being managed via ASDM or CLI session such as SSH, telnet, or serial
console.

Workaround:

Use a single ASDM or CLI session to edit and view ACL changes.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.8/3.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:H/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
8.0(4.28)
Known Fixed Releases:
8.2(5.31)
Bug Id:
CSCts69531
Title:
Traceback in Dispatch Unit on Standby with timeout floating-conn
Description:

Symptom:
Primary ASA5540 in failover rebooted in Thread Name: Dispatch Unit after assuming Standby role.

Conditions:
ASA5540 running 8.2.5 code. ''timeout floating-conn'' is configured. Immediately after issuing an ''failover active'' on the Secondary unit,
the Prmary-Standby reloaded.

Workaround:
Remove ''timeout floating-conn'' from the configuration.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
8.2(5), 8.6(1.2)
Known Fixed Releases:
100.7(13.34), 100.7(13.65), 100.7(14.24), 100.7(17.5), 100.7(18.2), 100.7(18.9), 100.7(19.8), 100.7(6.44), 100.7(6.62), 100.7(8.34)
Bug Id:
CSCuq03645
Title:
ASA-SM: Vlans assigned are not recognized by the configuration
Description:

Symptom:
VLANs assigned to the ASA will be pushed down as visible in the output of "show vlan" but will not be configurable as the ASA will not recognize the vlan when attempting to configure it.

Conditions:
Was first noticed in an ASA-SM running 8.5(1)11 in multi-context mode.

Workaround:
Reload the ASA.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
8.5(1.11)
Known Fixed Releases:
Bug Id:
CSCub11582
Title:
ASA5550 continous reboot with tls-proxy maximum session 4500
Description:

Symptom:
When "tls-proxy maximum-session 4500" is configured, Image asa84x reboots on ASA5550 during bootup.

Conditions:
1, Image 8.3 does not have this issue.
2, When "tls-proxy maximum-session" is bigger than 4440, ASA5550 will crash.

Workaround:
1, downgrade to 8.3
or
2, set "tls-proxy maximum-session" less than 4440 for img 8.4

Status:
Fixed
Severity:
2 Severe
Last Modified:
12-JUN-2015
Known Affected Releases:
8.4(3), 9.0(0.120)
Known Fixed Releases:
100.7(13.100), 100.7(6.94), 100.8(0.237), 100.8(11.39), 100.8(27.20), 100.8(33.23), 100.8(34.1), 100.8(38.1), 100.8(39.1), 100.9(0.2)
Bug Id:
CSCur51645
Title:
Linux Kernel ptrace Local Privilege Escalation Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-4699

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-4699 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1), 9.3(2), 9.4(1), 99.1
Known Fixed Releases:
Bug Id:
CSCuf31444
Title:
Linux Kernel compat_put_timeval() Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2012-4467

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2012-4467 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31791
Title:
Linux Kernel next_pidmap() Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1593

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-1593 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31756
Title:
Linux Kernel sock_sendpage() Local Privilege Escalation Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-2692

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2009-2692 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31873
Title:
Linux Kernel IA32SysCall Privilege Escalation Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-3301

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:W/RC:UR

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-3301 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31660
Title:
Linux Kernel binfmt_elf.c regset Handling Local Denial of Service Vuln
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2012-1097

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2012-1097 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31798
Title:
Linux Kernel wait_for_unix_gc() Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-4249

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-4249 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31804
Title:
Linux Kernel Transparent Interprocess Communication Protocol Local Den
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-1187

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-1187 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
1 Catastrophic
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31865
Title:
Libcg Project libcgroup Library Task Controller List Processing Privil
Description:

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1006

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:W/RC:UR

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-1006 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
100.11(0.50), 100.8(40.89), 9.2(3.101)
Bug Id:
CSCuf31760
Title:
Linux Kernel Block Layer IOCTL Request Processing Denial of Service Vu
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-4162

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-4162 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31750
Title:
Linux Kernel Virtual Machine Local Guest System Denial of Service Vuln
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-3290

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2009-3290 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCur54965
Title:
cURL and libcurl Certificate Validation Remote SSL Server Spoofing Vul
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-4545

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.3:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-4545 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.7(1), 9.2(1), 9.3(2), 9.3(2.200), 9.4(1), 99.1
Known Fixed Releases:
Bug Id:
CSCuf31475
Title:
Linux Kernel KVM Device Assignment Page Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2012-2121

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2012-2121 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31448
Title:
Linux Kernel futex_lock_pi() Denial of Service Vuln CVE-2010-0623
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-0623

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:POC/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-0623 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1
Known Fixed Releases:
Bug Id:
CSCuf31665
Title:
Linux Kernel execve() Memory Allocation Local Denial of Service Vulner
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-4243

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-4243 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31853
Title:
Linux Kernel setup_routing_entry() KVM Function Local Buffer Overflow
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2012-2137

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2012-2137 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
1 Catastrophic
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31740
Title:
Linux Kernel LDM Partition Tables Handling Buffer Overflow Vulnerabili
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1017

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-1017 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31842
Title:
Linux Kernel taskstats.c Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-2484

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-2484 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31541
Title:
Linux Kernel setup_arg_pages() Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-3858

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:POC/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-3858 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31673
Title:
Linux Kernel inotify_init() Double Free Error Denial of Service Vulner
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1479

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-1479 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31577
Title:
GNU glibc LD_AUDIT Local Privilege Escalation Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-3856

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-3856 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31536
Title:
Linux Kernel inotify_init() Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-4250

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-4250 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31547
Title:
Linux Kernel Clone() Function clone_io Local Denial of Service Vulnera
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2012-0879

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2012-0879 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31612
Title:
Linux Kernel mprotect_fixup() Memory Corruption Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-4169

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.7:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-4169 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
1 Catastrophic
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31788
Title:
Linux Kernel napi_reuse_skb() Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1576

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-1576 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31463
Title:
Linux Kernel epoll Implementation Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1083

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-1083 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31654
Title:
Linux Kernel GUID Partition Tables Handling Arbitrary Code Execution V
Description:

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1776

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-1776 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
100.12(10.47), 100.8(40.84), 9.0(4.25), 9.1(5.100), 9.1(5.20), 9.2(2.100), 99.1(2.27), 99.1(3.9)
Bug Id:
CSCuf31621
Title:
Linux Kernel KVM Programmable Interrupt Timer Denial of Service Vulner
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-4622

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:UR

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-4622 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31742
Title:
Linux Kernel ldm_get_vblks Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1012

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-1012 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31447
Title:
Linux Kernel wake_futex_pi() Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-0622

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-0622 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31585
Title:
Linux Kernel Remote Operations Service Element Protocol Implementation
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-3310

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-3310 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31705
Title:
Linux Kernel set_ftrace_filter Local Denial of Service Vulnerability
Description:

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-3079

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-3079 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
100.11(0.43), 100.12(0.37), 100.12(10.35), 100.12(15.10), 100.12(21.3), 100.12(6.4), 100.8(40.82), 9.2(2.100), 9.3(1.99), 9.3(2)
Bug Id:
CSCuh88056
Title:
Linux Kernel fuse_direct_io() Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-4021

Cisco has analyzed these vulnerabilities and concluded that the product
is not impacted

Conditions:

Not applicable

Workaround:

Not applicable

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html

PSIRT Evaluation:

The Cisco PSIRT has evaluated this issue and does not meet the criteria
for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change
in the severity of this issue, please contact psirt@cisco.com for
another evaluation.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1
Known Fixed Releases:
Bug Id:
CSCui50798
Title:
Linux Kernel tcp_read_sock() Function Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-2128

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-2128 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31527
Title:
Linux Kernel sock_alloc_send_pskb() Function Local Denial of Service V
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2012-2136

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:UR

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2012-2136 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31870
Title:
Linux Kernel execve() Local Privilege Escalation Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-2848

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2009-2848 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31441
Title:
Linux Kernel PER_CLEAR_ON_SETID Local Privilege Escalation Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-1895

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2009-1895 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCur54979
Title:
Linux Kernel KVM Subsystem Programmable Interval Timer Emulation Denia
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-3611

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-3611 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur54877
Title:
GNU glibc Heap gconv_translit_find() Function Local Code Execution Vul
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-5119

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-5119 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1), 99.1
Known Fixed Releases:
Bug Id:
CSCuf31859
Title:
Linux Kernel SELinux mmap_min_addr Local Privilege Escalation Vulnerab
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-2695

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2009-2695 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCul47481
Title:
ASA WebVPN Login portal returns to login page after successful login
Description:

Symptom:
After a period of operation, a users are unable to login to the Clientless WebVPN portal. After logging in, the user is redirected back to the login page. The problem happens after authentication, so failed logins still report as failures. Reloading the ASA or failing over to the standby ASA resolves the issue for a period of time.

Conditions:
Clientless WebVPN on ASA.

Workaround:
The problem appears to happen after a period of operation after upgrading to 8.4.7 (This issue has not been reported against 8.4.5/9.0.3 releases). Reloading the ASA or failing over to the standby unit should resolve the issue for a period of time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(7)
Known Fixed Releases:
100.10(0.63), 100.10(2.4), 100.10(3.1), 100.10(9.1), 100.7(6.127), 100.8(38.95), 100.8(40.56), 100.9(10.23), 8.4(7.8), 9.0(4.2)
Bug Id:
CSCuf31675
Title:
Linux Kernel Kernel-Based Virtual Machine Local Denial of Service Vuln
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-2287

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2009-2287 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31685
Title:
Linux Kernel Network Lock Manager nlmclnt_lock() Denial of Service Vul
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-2491

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-2491 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31611
Title:
Linux Kernel Address Limit Override Arbitrary Code Execution Vulnerabi
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-4258

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-4258 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31805
Title:
Linux Kernel VLAN Tag Remote Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-4263

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-4263 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
1 Catastrophic
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31838
Title:
Linux Kernel mremap() Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-2496

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-2496 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31607
Title:
Linux Kernel Invalid fs and gs Registry KVM Denial of Service Vulnerab
Description:

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-3698

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-3698 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
100.11(0.47), 100.12(0.51), 100.12(22.1), 100.13(0.3), 100.13(12.5), 100.13(13.1), 100.13(14.3), 100.13(15.2), 100.13(16.1), 100.13(17.1)
Bug Id:
CSCuh47484
Title:
Kernel KVM kvm_set_memory_region() Function Local Escalation of Privil
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-1943

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-1943 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31786
Title:
Linux Kernel page_count Parameter Processing Local Buffer Overflow Vul
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-1746

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:UC

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-1746 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31814
Title:
Linux Kernel pipe.c Local Privilege Escalation Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-3547

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2009-3547 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31727
Title:
Linux Kernel inet_diag_bc_audit() Local Denial of Service Vulnerabilit
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-2213

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-2213 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31848
Title:
Linux Kernel MSS Processing Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-4165

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:N/A:N/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-4165 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCur54978
Title:
Linux Kernel KVM Subsystem VM Exits Local Denial of Service Vulnerabil
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-3646

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.7:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-3646 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCuf31726
Title:
uLinux Kernel agp_generic_remove_memory() Local Privilege Escalation Vu
Description:

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-2022

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-2022 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
100.11(0.50), 100.12(0.70), 100.12(6.20), 100.13(0.6), 100.13(11.11), 100.13(12.16), 100.13(15.7), 100.13(16.2), 100.13(17.2), 100.13(18.1)
Bug Id:
CSCuf31571
Title:
Linux Kernel Memory Management Quota Handling Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2012-2133

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2012-2133 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
1 Catastrophic
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31846
Title:
Linux Kernel PERF_COUNT_SW_CPU_CLOCK Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-2918

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-2918 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1
Known Fixed Releases:
Bug Id:
CSCuf31824
Title:
Linux Kernel Transparent Huge Pages Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-0999

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-0999 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31618
Title:
Linux Kernel Multicast IPv4 Traffic on HiperSockets Device Denial of S
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-4251

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-4251 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
1 Catastrophic
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCur54853
Title:
Linux Kernel NF_CONNTRACK Local Information Disclosure Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-1690

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.0:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-1690 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1), 9.3(2), 9.4(1), 99.1
Known Fixed Releases:
Bug Id:
CSCuf31701
Title:
Linux Kernel create_pit_timer() Function Denial of Service Vulnerabili
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-4622

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:UR

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-4622 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCur68863
Title:
GNU libtasn1 Multiple Buffer Boundary Checks Denial of Service Vulnera
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-3467

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.0:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-3467 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCut29837
Title:
cURL and libcurl Certificate Field Wildcard Value Processing Spoofing
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-0139

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:TF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-0139 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.7(1), 9.2(1), 9.3(2.200), 9.4(1), 99.1
Known Fixed Releases:
Bug Id:
CSCur54856
Title:
XMLSoft libxml2 Entity Expansion Handling Denial of Service Vulnerabil
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-0191

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:P/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-0191 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCuf31564
Title:
Linux Kernel mmap and mremap Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-0291

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-0291 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31652
Title:
Linux Kernel-Based Virtual Machine Local Denial of Service Vulnerabili
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-4031

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2009-4031 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCuf31835
Title:
Linux Kernel KVM Local Denial of Service Vulnerability
Description:

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-0309

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
Not currently available.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-0309 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
100.11(0.51), 100.8(40.87), 9.2(3.101)
Bug Id:
CSCur68856
Title:
Linux Kernel IPv6 Router Advertisement Packet Processing Denial of Ser
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-2309

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-2309 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68874
Title:
Linux Kernel ath_tx_aggr_sleep() Function Race Condition Denial of Ser
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-2672

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-2672 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur54947
Title:
GnuPG and Libgcrypt Private Key Information Disclosure Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-4242

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 2.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:H/Au:S/C:P/I:P/A:N/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-4242 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.2(1), 99.1
Known Fixed Releases:
Bug Id:
CSCut29840
Title:
Glibc wordexp Function Command Substitution Arbitrary Command Executio
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-7817

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 3.2:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:P/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-7817 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1), 99.1
Known Fixed Releases:
Bug Id:
CSCut29848
Title:
Linux Kernel syscall Tracing Functionality Local Denial of Service Vul
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-7825

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-7825 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68844
Title:
Xen QEMU SCSI REPORT LUNS Memory Corruption Code Execution Vulnerabili
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-4344

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-4344 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68878
Title:
Red Hat qemu-kvm High Resolution Display Memory Leak Information Discl
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-3615

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 2.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:H/Au:S/C:P/I:P/A:N/E:U/RL:TF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-3615 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCti43763
Title:
Management connection fail after multiple tries with SNMP connections.
Description:

Symptom:
Management connections may fail after multiple tries with SNMP connections in background.

Conditions:

This bug can be identified by doing "show asp table socket"
If you see management connection in a CLOSEWAIT state and then you do "show counters protocol npshim" and see the pending connections counter increment for every management connection attempt then you are hitting this bug.


First found in following scenario:
ASDM will fail to load after multiple SNMP and HTTPS requests to the ASA.

Workaround:
Currently, only reloading the ASA resolves the issue.

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.0(5.20), 8.2(2), 8.2(3)
Known Fixed Releases:
100.5(5.43), 8.0(5.21), 8.1(2.49), 8.2(3.109), 8.2(3.6), 8.2(4), 8.3(2.7)
Bug Id:
CSCur68843
Title:
GnuTLS Regression Error Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-2116

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.0:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-2116 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68870
Title:
Linux Kernel SCTP NULL Pointer Dereference Remote Denial of Service Vu
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-5077

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-5077 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCte55194
Title:
"possible channel leak" and hang when loading a large configuration
Description:

Symptom:
CLI access to the ASA may hang with one of the following messages when processing an extremely large configuration:

release: possible channel leak in fover_parse

release: possible channel leak in pix_flash_config_thread.

release: possible channel leak in ssh

Conditions:
Uername from Cert feature

Workaround:
Downgrade to 8.2(1)

Status:
Fixed
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.2(2), 8.2(2.4), 8.3(1)
Known Fixed Releases:
100.5(5.14), 100.7(0.10), 100.7(6.1), 8.2(2.102), 8.2(2.13), 8.3(1.100), 8.3(1.3), 8.4(0.99), 8.4(1)
Bug Id:
CSCur68869
Title:
Linux Kernel PPP L2TP Sockets Local Elevated Privileges Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-4943

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-4943 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68859
Title:
Linux Kernel n_tty_write Function Buffer Overflow Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-0196

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-0196 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCut29845
Title:
Linux Kernel Netlink Message Security Bypass Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-0181

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 1.2:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-0181 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68872
Title:
Linux Kernel ping_init_sock() Function Use-After-Free Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-2851

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.0:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:H/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-2851 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68862
Title:
GNU libtasn1 asn1_get_bit_der() Incorrect Length Report Code Execution
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-3468

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-3468 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCut29842
Title:
Linux Kernel Memory Fault Privilege Escalation Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-9322

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.8:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-9322 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68868
Title:
Linux Kernel aio_read_events_ring() Function Information Disclosure Vu
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-0206

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 1.7:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:P/I:N/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-0206 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68871
Title:
QEMU L2 Table Size Validation Integer Overflow Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-0222

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.3:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-0222 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68854
Title:
Linux Kernel compat_sys_recvmmsg Function Local Privilege Escalation V
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-0038

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-0038 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCut29843
Title:
cURL and libcurl Connection Reuse Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-0138

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.3:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-0138 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
8.7(1), 9.2(1), 9.3(2.200), 9.4(1), 99.1
Known Fixed Releases:
Bug Id:
CSCur68875
Title:
Linux Kernel Network Packet Processing Null Pointer Dereference Denial
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-3535

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-3535 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
13-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCuu16772
Title:
IPv6 ICMP PTB messages not changing TCP SEQ across ASA FW
Description:

Symptom:
Customer sees the the ICMP PTB message go over the FW, but the SEQ number does not get updated.

Conditions:
ICMP PTB messages being sent across the ASA, but the TCP SEQ matching the SEQ number when the ASA has
enabled SNR.But cannot disable SNR as that would be a security issue.
TCP sessions over the FW have the TCP Sequence number randomized by default (SNR). This is to prevent external malicious intent by calculating the next SEQ number and sending packets over the FW. As such the Inside and Outside TCP Sequence numbers are altered by the ASA, and re-written as packets flow in/out.

Workaround:
Disable sequence number randomization (SNR).

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
8.4(7.240)
Known Fixed Releases:
Bug Id:
CSCum12183
Title:
ASA Ver 8.4(6)6 traceback with Thread Name: DATAPATH-2-1145
Description:

Symptom:
ASA Firewall running Version 8.4(6)6 traceback in DATAPATH-2-1145.

Conditions:
ASA is running version 8.4(6)6 and VPN environments in Failover configuration.

Workaround:
None

Further Problem Description:
None

Status:
Other
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
8.4(6.6)
Known Fixed Releases:
Bug Id:
CSCur64589
Title:
DATAPATH Traceback in snp_mp_svc_udp_upstream_data function
Description:

Symptom:
ASA Traceback with Thread Name: DATAPATH.

Conditions:
Cisco ASA running release 9.1.5.19.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
8.4(7.23), 9.1(5.12), 9.1(5.19)
Known Fixed Releases:
100.11(0.54), 100.12(0.98), 100.12(23.4), 100.12(24.3), 100.13(0.11), 100.13(1.5), 100.13(11.19), 100.13(12.41), 100.13(16.18), 100.13(18.7)
Bug Id:
CSCuf71119
Title:
Incorrect NAT rules picked up due to divert entries
Description:

Symptom:
Unidirectional NAT functionality not working as expected.
Conditions:
ASA running on ASA 8.4.3 or higher
Workaround:
1) Creating specific NAT rules
2) Use "any" in the egress interface to force route lookup
Further Problem Description
Upon upgrade from ASA 8.4.2.x to ASA 8.4.3 or higher, incorrect nat rule gets
picked up due to nat-divert rules.
Case 1:
########
ASA# sho run nat
nat (dmz,outside) source static Mail01_DMZ MAIL_NAT_IP_WAN service SMTP SMTP
unidirectional
..
nat (outside,dmz) source static any any destination static MAIL_NAT_IP_WAN
Mail01_DMZ service SMTP SMTP unidirectional

On ASA 8.4.2.x :
===============
We see packet from DMZ network with random port to inside network on
port 25, doesn't need a NAT and ingress and egress are expected and based on
route lookup.
On ASA 8.4.5 :
==============
For the same traffic, we see traffic hitting nat for DMZ to outside :
nat (dmz,outside) source static Mail01_DMZ MAIL_NAT_IP_WAN service SMTP SMTP
unidirectional
The traffic gets untranslated due to the above and egresses out to the outside
interface
using the above NAT.

Case 2:
########
ASA# sho run nat
nat (inside,outside) source dynamic OBJ_NATTESTREAL OBJ_NATTESTMAPPED_OUTSIDE
service OBJ_TCP_SMTP OBJ_TCP_SMTP
..
nat (inside,dmz1) source dynamic OBJ_NATTESTREAL OBJ_NATTESTMAPPED_DMZ1 service
OBJ_TCP_SMTP OBJ_TCP_SMTP

In 8.4.5, the first rule gets picked up always and traffic diverted to outside
ifc even if
destination resides in dmz1 interface.





Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
8.4(3), 8.4(5), 8.4(5.6), 9.0(0.108)
Known Fixed Releases:
100.10(0.6), 100.7(6.118), 100.8(27.84), 100.8(38.19), 100.8(40.8), 100.8(41.2), 100.8(60.20), 100.9(0.50), 100.9(10.1), 100.9(6.28)
Bug Id:
CSCuu57547
Title:
ASA SIP inspected traffic matches wrong NAT rule
Description:

Symptom:
ASA SIP inspected traffic matches wrong NAT rule

This has as an effect SIP streams like BFCP traffic (source port UDP 5070) to get diverted to wrong egress interface.

Conditions:

Workaround:
Disable SIP inspection

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
9.0(1), 9.1(5), 9.1(6.4), 9.2(3.4), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCui63073
Title:
5580-20 crashes while running aggressive ipv4 webvpn tput/cap test.
Description:

Symptom:
The 5580-20 is crashing when ASA 9.0.3 image is running a very aggressive webvpn ipv4 tput/cap test

Conditions:
This is the usual tput/cap test with a 40/sec session bring up rate. This is 4 times faster than
the normal 10/sec session bring up rate.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
9.0(2), 9.0(3)
Known Fixed Releases:
100.10(0.13), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.8(27.94), 100.8(38.33), 100.8(41.2), 100.8(45.2), 100.8(46.1), 100.8(49.1)
Bug Id:
CSCut30741
Title:
ASA redirection to Scansafe tower fails with log id "775002" in syslog
Description:

Symptom:
ASA redirection to Scansafe tower fails with log id "775002" in syslog even when the platform limit for connections was not reached.

Conditions:
Was noticed in version 9.0(2) but could affect any release.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
9.0(2)
Known Fixed Releases:
100.11(0.57), 100.12(0.116), 100.13(0.52), 100.13(21.9), 100.14(0.4), 100.14(1.4), 100.14(10.7), 100.14(11.7), 100.14(2.9), 100.14(26.4)
Bug Id:
CSCtz26123
Title:
ASA traceback in SiteMinder SSO when users log into ssl vpn web portal
Description:

Symptom:

When users log into ssl vpn web portal the ASA crashes and reboots.

Conditions:

Logging into ASA Webvpn Portal

Workaround:

None

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
8.4(2), 8.4(3), 8.4(3.9)
Known Fixed Releases:
100.7(13.80), 100.7(21.7), 100.7(6.80), 100.8(0.149), 100.8(11.23), 100.8(27.19), 100.8(33.7), 100.8(34.1), 100.9(0.1), 100.9(2.1)
Bug Id:
CSCue18975
Title:
IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability
Description:

Summary

Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability
SQL*Net Inspection Engine Denial of Service Vulnerability
Digital Certificate Authentication Bypass Vulnerability
Remote Access VPN Authentication Bypass Vulnerability
Digital Certificate HTTP Authentication Bypass Vulnerability
HTTP Deep Packet Inspection Denial of Service Vulnerability
DNS Inspection Denial of Service Vulnerability
AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability
Clientless SSL VPN Denial of Service Vulnerability


These vulnerabilities are independent of one other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability, SQL*Net Inspection Engine Denial of Service
Vulnerability, HTTP Deep Packet Inspection Denial of Service Vulnerability, DNS Inspection Denial of Service Vulnerability and Clientless SSL VPN
Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Digital Certificate Authentication Bypass Vulnerability, Remote Access VPN Authentication Bypass Vulnerability,
and Digital Certificate HTTP Authentication Bypass Vulnerability may result in an authentication bypass, which could allow the attacker access to
the inside network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Successful exploitation of the AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability may exhaust available memory, which could
result in general system instability and cause the affected system to become unresponsive and stop forwarding traffic.

Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of the vulnerabilities. This
advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa

Note: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers may be affected by the
SQL*Net Inspection Engine Denial of Service Vulnerability. A separate Cisco Security Advisory has been published to disclose the vulnerabilities
that affect the Cisco FWSM. This advisory is available at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-5507 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Symptom:

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
100.8(50.20), 100.9(7.14), 100.9(7.15), 9.1(1.4)
Known Fixed Releases:
100.8(27.63), 100.8(50.35), 100.9(0.35), 100.9(4.5), 100.9(6.10), 100.9(7.19), 100.9(8.1), 9.0(2.100), 9.0(2.2), 9.0(3)
Bug Id:
CSCus57241
Title:
ASA 9.3.2:DAP intermittently uses dflt policy for VPN RA sessions
Description:

Symptom:
After upgrade from 9.2.(2.4) to 9.3(2) , VPN remote access connections are intermittently matching the DfltAccessPolicy instead of matching the appropriate policy. If the DfltAccessPolicy policy's action is to terminate, the VPN RA sessions will not establish.

Conditions:
- DAP is configured
- ASA upgraded from 9.2(2.4) to 9.3(2)

Workaround:
- allow permit in the default policy (action=continue), if your security policy allows for this.
-Downgrade to ASA pre-9.3.2 release, if at all possible.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
100.12(0.112), 100.13(0.23), 100.13(19.9), 100.13(20.10), 100.13(21.7), 100.14(0.2), 100.14(1.2), 100.14(10.2), 100.14(11.2), 100.14(12.1)
Bug Id:
CSCus62884
Title:
ASA 9.1.5 does not always drop connections after receiving RST+ACK flag
Description:

Symptom:
ASA does not always drop connections after receiving RST+ACK flag

Conditions:
Verify that the problem occurs when the server receives duplicate packets from the client to the server and replies to both SYN

Example

Server packets

client -> server SYN (seq=3922308568) ------> 1st SYN
client -> server SYN (seq=3922308568) --------> 2nd SYN
client <- server SYN+ACK (seq=3220609139 ACK=3922308569) ------> reply for 1st SYN
client <- server RST+ACK (seq=0 ACK=3922308569) ----------> reply for the 2nd SYN


Firewall packets

client -> server SYN (seq=3922308568)
client <- server SYN+ACK (seq=3220609139 ACK=3922308569) ------> reply for 1st SYN
client <- server RST+ack (seq=0 ACK=3922308569) ----------> reply for the 2nd SYN, which the Firewall doesn't have it

In the working and not working scenario the Firewall always sends one SYN packet.

Workaround:
TCPbypass

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
9.1(5)
Known Fixed Releases:
100.11(0.57), 100.12(0.115), 100.13(0.46), 100.13(21.7), 100.14(0.3), 100.14(1.3), 100.14(10.6), 100.14(11.6), 100.14(2.7), 100.14(26.2)
Bug Id:
CSCuu86165
Title:
ASA 9.3: Active ASA denies AnyConnect sessions - incorrect license limit
Description:

Symptom:
ASA may start denying new AnyConnect connections with the following logs:

syslog:
%ASA-4-113029: Group User IP <192.168.1.1> Session could not be established: session limit of 250 reached.

debug aaa shim:
AAA/SHIM: authenticating , tgroup=ANYCONNECT
AAA/SHIM: AAA response=ACCEPT
AAA/SHIM: license limit reached 250
AAA/SHIM: Error failed to update license

However, total active AnyConnect VPN sessions on the ASA is 4 [show vpn-sessiondb summary]

Conditions:
ASA Failover Pair running on 9.3(2). The ASA is configured as AnyConnect VPN Server.

ASA-Pri-act has 250 AnyConnect Premium Peers license
ASA-Sec-stby has 2 AnyConnect Premium Peers license.

The total failover AnyConnect license count is 250 [Platform limit (250 + 2)] for instance on 5515.

Workaround:
Reload both the ASAs simultaneously

Further Problem Description:
This issue rarely occurs. However, should you ever come across this, collect the following *during the time of the issue* and reach out to Cisco TAC:
- any configuration changes
- any failover transitions
- syslogs
- show tech
- show vpb-sessiondb summary
- debugs during session establishment:
debug vpn-sessiondb 255
debug aaa shim 255

Status:
Terminated
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
Bug Id:
CSCuq57307
Title:
ASA 8.4 Memory leak due to duplicate entries in ASP table
Description:

Symptom:
The ASA may experience a memory leak each time a VPN tunnel is built and torn down.

Conditions:
The ASA must be configured with a QoS policy that matches on per-flow destination addresses for a particular tunnel-group. For example:

class-map vpn-class
match flow ip destination-address <<<<<<<<<<<<<
match tunnel-group 10.38.110.250
!
policy-map outside-policy
class vpn-class
police output 30000000

Workaround:
Temporarily disable the QoS policy

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
8.4(5)
Known Fixed Releases:
100.11(0.57), 100.11(0.58), 100.12(0.116), 100.12(0.121), 100.13(0.52), 100.13(0.63), 100.13(21.13), 100.13(21.9), 100.13(28.2), 100.14(0.4)
Bug Id:
CSCtr65014
Title:
vpn-filter removed incorrectly from ASP table blocks L2L traffic
Description:

Symptom:
Users can ping from the ASA's local LAN across a lan-to-lan tunnel to a remote host but not from the same remote host to the same local host.
Traffic is encrypted and decrypted successfully on the ipsec SAs, but after inbound traffic gets decrypted it is dropped by the ASA ASP rule 'acl-drop'. Verify this with an asp-type capture with the trace option and/or packet-tracer.
The vpn-filter that the l2l tunnel is associated with only has outbound rules installed - the inbound rules were deleted incorrectly. Verify with 'show asp table filter access-list '.

Conditions:
Vpn-filter applied to a group-policy and multiple tunnels landing on that vpn-filter.

Workaround:
Clear all tunnels that are landing on that group-policy using the command: 'vpn-sessiondb logoff ipaddress x.x.x.x'

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
8.2(5), 8.3(2), 8.3(2.13)
Known Fixed Releases:
100.7(13.77), 100.7(6.79), 100.8(0.140), 100.8(11.22), 100.8(27.7), 100.8(33.6), 100.8(34.1), 100.9(0.1), 100.9(2.1), 8.2(5.30)
Bug Id:
CSCui79979
Title:
ASA 9.1.2 - Traceback in Thread Name: fover_parse during configuration
Description:

Symptom:
Primary ASA running in A/A failover might crash during reconfiguration.

Conditions:
Failover enabled on ASA

Workaround:
Not known

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
9.1(2), 9.1(3)
Known Fixed Releases:
100.10(0.75), 100.10(2.7), 100.10(6.1), 100.10(7.1), 100.10(9.1), 100.8(38.109), 100.8(40.58), 100.8(56.15), 100.9(10.26), 9.0(4.8)
Bug Id:
CSCue63881
Title:
ASA SSHv2 Denial of Service Vulnerability
Description:

Symptoms:
ASA cannot be accessed via SSH.

Conditions:
This may happen both in routed or transparent mode for both multicontext or single mode ASA. This can be triggered by IPv4 and IPv6 packets. Only
traffic directed to the ASA can trigger this vulnerability.

Workaround:
Using HTTPS management interface or console can be used as temporary workaround.


Further Problem Description:
A vulnerability in the implementation of the Secure SHell (SSH) function could allow an unauthenticated, remote attacker to deny SSH management
access to legitimate users.

The vulnerability is due to improper implementation of the logic to terminate SSH sessions. An attacker could exploit this vulnerability by
starting an SSH session to the affected system. This vulnerability is affecting both SSHv1 and v2. An exploit could allow the attacker to deny
SSH management access to legitimate user. The attacker will be able to deny the access for 60 seconds, after which, the affected system will
release the resource and users will be able to use the SSH service again. However, repeated exploitation may lead to a denial of service condition.

This bug is fixing the issue for SSHv2 only connection. SSHv1 will be fixed in a separate bug: CSCuf51892.
Issue on SSHv1 can be workaround by forcing the ASA to accept only SSHv2 connection by the config mode command:

ssh version 2

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2013-1193 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1193

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
8.4(4.1)
Known Fixed Releases:
100.7(13.111), 100.7(6.111), 100.8(27.63), 100.8(50.39), 100.9(0.35), 100.9(4.5), 100.9(6.10), 100.9(7.9), 100.9(8.1), 8.2(5.45)
Bug Id:
CSCta55072
Title:
ASA traceback in Thread Name: Dispatch Unit, Abort: Assert Failure
Description:

Symptom:
ASA intermittent crash at Thread Name: Dispatch Unit, Abort: Assert Failure
Conditions:
Running 8.2.1version.
The ASA5505 box has a basic license with Inside hosts limit. When the total number of inside hosts exceeds the limit, it may trigger the crash.
If there is no limit for inside hosts with the license, the crash won't be triggered.
Workaround:
No workaround
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
8.2(1)
Known Fixed Releases:
100.3(0.3), 100.4(0.7), 100.4(0.9), 8.1(2.31), 8.1(2.32), 8.2(1.10), 8.2(4), 8.3(0.0)
Bug Id:
CSCuu20067
Title:
ASA:Traceback in Thread Name: Unicorn Proxy Thread
Description:

Symptom:
ASA Traceback with Thread Name:- Unicorn Proxy Thread

Conditions:
ASA device configured with VPN load balancing

Workaround:
NONE

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
9.1(5.12)
Known Fixed Releases:
Bug Id:
CSCuu72066
Title:
Traceback in snp_inject_new_pkt+36 at np/soft-np
Description:

Symptom:
Traceback is observed in Thread Name: DATAPATH-16-2555 snp_inject_new_pkt

Conditions:
When interface involved in TD traffic is removed.

Workaround:
Do not remove the interface involved during TD traffic being sent.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
100.15(1.13), 9.1(6), 9.1(6.6)
Known Fixed Releases:
Bug Id:
CSCtg88576
Title:
asa standby unit crashes with assertion in snp_sp_action.c
Description:

Symptom:
ASA is configured in active/standby failover mode to process 100 mbps of multicast traffic. All traffic is fragmented udp. At the same time, an expect script is used to continuously change active unit config, and another script to perform a few show and clear commands on the standby unit.

The standby unit gives the following after a few hours.

core0: An internal error occurred. Specifically, a programming assertion was
violated. Copy the error message exactly as it appears, and get the
output of the show version command and the contents of the configuration
file. Then call your technical support representative.

assertion "count > 0" failed: file "snp_sp_action.c", line 2066

Conditions:
It occurs after several hours after long term multicast traffic and continuous config changes and show/clear commands.

Workaround:
N/A. After reboot things were back to normal.

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
8.2(2.15)
Known Fixed Releases:
Bug Id:
CSCto61126
Title:
CSC: HTTP 204 messages cause connections to timeout and fail.
Description:

Symptom:
If the CSC Modules processes a HTTP 204 No Content message returned from a Webserver, the connection associated with that Request and Response will hang on the CSC module and it will not be able to process more requests on that HTTP session. This is seen as the web browser hanging while accessing sites. The issue was first reported with Search Results from Yahoo.com which utilize HTTP 204 responses.

Conditions:
This is seen on all current builds of CSC code and only when processing HTTP 204 No Content messages.

Workaround:
None at this time.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.3(1172.3)
Known Fixed Releases:
Bug Id:
CSCti05907
Title:
CSC: Block email with attachments despite GUI setting not to block
Description:

Symptom:
CSC-SSM strips or deletes emails with any file type attachments

Conditions:
Content Filtering is enabled and GUI setting indicate not to block emails with attachments

Workaround:
Temporary disable content filtering if possible

Further Problem Description
The rule configuration is likely corrupted. Reimage to reset to factory default

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.3
Known Fixed Releases:
Bug Id:
CSCty04397
Title:
CSC: iwss-process crash when handling a large file
Description:

Symptom:
In some circumstances you may see notification of the CSC Module 'reloading' due to pattern file or config change multiple times during the day. These events do not match up with the configured update timer or any config changes.

Conditions:
This has been seen on CSC module version 6.6.1125.0 and seems to be related to scanning very large files.

Workaround:
None at this time

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
6.6(1125.0)
Known Fixed Releases:
Bug Id:
CSCur05643
Title:
Cisco Adaptive Security Appliance (ASA) CVE-2014-6271 and CVE-2014-7169
Description:

Symptom:
The Cisco Adaptive Security Appliance (ASA) Software includes a version of bash that is affected by the vulnerabilities
identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-6271
CVE-2014-7169

This bug has been opened to address the potential impact on this product.

Conditions:
Devices with default configuration.

Workaround:
Not Available.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The Base and Temporal CVSS scores as of the time of evaluation
are 7.5/7.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
8.1(2.7)
Known Fixed Releases:
Bug Id:
CSCuc08994
Title:
CSC: iwss-process may crash in certain traffic conditions
Description:

Symptom:
The CSC module may unexpectedly reload logging the following syslog:

ASA-SSM-CSC-20-K9 Module in slot 1, application reloading "CSC SSM", version "6.6.1125.0" CSC SSM scan services are reloading because of a pattern file or configuration update.

Conditions:
This is seen with the CSC module running code version 6.6.1125.0 and with HTTP Scanning enabled.

Workaround:
None at this time. The outages are very short lived while the iwss-process reloads.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
6.6(1125.0)
Known Fixed Releases:
Bug Id:
CSCuj50870
Title:
ASA in failover pair may panic in shrlock_unjoin
Description:

Symptom:
ASA may crash with the following message on console:

Message #220 : Panic: DATAPATH-15-1947 - Message #221 : ERROR: shrlock_unjoin_domain Domain member count underflow

Conditions:
This was observed on ASA in failover pair. Both active and standby units may crash.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
100.9, 100.9(0.54), 100.9(7.25), 100.9(7.27), 9.0(3), 9.1(1)
Known Fixed Releases:
100.10(0.58), 100.10(2.3), 100.10(3.1), 100.10(9.1), 100.8(40.56), 9.0(4.1), 9.0(4.140), 9.1(4.1), 9.1(4.115), 9.1(5)
Bug Id:
CSCul36176
Title:
Cisco ASA VPN Denial of Service Vulnerability
Description:

Symptom:
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Denial of Service Vulnerability
Cisco ASA IKEv2 Denial of Service Vulnerability
Cisco ASA High Performance Monitor Denial of Service Vulnerability
Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability
Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability
Cisco ASA DNS Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Failover Command Injection Vulnerability
Cisco ASA VNMC Command Input Validation Vulnerability
Cisco ASA Local Path Inclusion Vulnerability
Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability
Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability
Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability

These vulnerabilities are independent of one another; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability, Cisco ASA VPN Denial of Service Vulnerability, Cisco ASA IKEv2 Denial of Service Vulnerability, Cisco ASA High Performance Monitor Denial of Service Vulnerability, Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability, Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability, and Cisco ASA DNS Inspection Engine Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Cisco ASA VPN Failover Command Injection Vulnerability, Cisco ASA VNMC Command Input Validation Vulnerability, and Cisco ASA Local Path Inclusion Vulnerability may result in full compromise of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability may result in the disclosure of internal information or, in some cases, a reload of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability may result in a compromise of the Clientless SSL VPN portal, which may lead to several types of attacks, which are not limited to cross-site scripting (XSS), stealing of credentials, or redirects of users to malicious web pages.

Successful exploitation of the Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability may result in a digital certificate validation bypass, which could allow the attacker to bypass digital certificate authentication and gain access inside the network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa

Conditions:
See published Cisco Security Advisory

Workaround:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS sscores as of the time of evaluation are 7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2014-3383 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be fou

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
100.10(0.42), 100.8(38.72), 100.8(40.45), 9.1(4.3), 9.1(5)
Known Fixed Releases:
100.10(0.46), 100.10(2.3), 100.10(3.1), 100.10(9.1), 100.8(38.74), 100.8(40.48), 100.8(46.47), 100.8(51.10), 100.9(10.18), 9.1(5.1)
Bug Id:
CSCus86728
Title:
Traceback Thread Name: Dispatch Unit
Description:

Symptom:
First Traceback Thread Name: Dispatch Unit

Conditions:

Workaround:
Unknown

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
8.4(7.23)
Known Fixed Releases:
Bug Id:
CSCul46582
Title:
ASA: Out of order Fin packet leaves connection half closed
Description:

Symptom:
During the session closing ASA receive out of order FIN packets from one host. ASA keeps this connection as half-closed.

Conditions:
ASA receive out of order FIN packet only from one host (in this case from client)
Server Client

--> (SEQ=407)(ACK=1453)(CTL=FIN,ACK) -->
<-- (SEQ=1454)(ACK=408)(CTL=ACK) <--
<-- (SEQ=1453)(ACK=407)(CTL=FIN,ACK) <--
--> (SEQ=408)(ACK=1454)(CTL=ACK) -->


During the recreation I changed manually the sequence:
Server Client

--> (SEQ=407)(ACK=1453)(CTL=FIN,ACK) -->
<-- (SEQ=1453)(ACK=407)(CTL=FIN,ACK) <--
<-- (SEQ=1454)(ACK=408)(CTL=ACK) <--
--> (SEQ=408)(ACK=1454)(CTL=ACK) -->


Then connection is tear down normally.

Workaround:
configure tcp bypass for affected traffic
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
8.5(1.16), 9.1(3)
Known Fixed Releases:
100.10(0.63), 100.10(2.4), 100.10(3.1), 100.10(9.1), 100.8(40.56), 9.0(4.1), 9.0(4.141), 9.1(4.1), 9.1(4.115), 9.1(5)
Bug Id:
CSCuh33570
Title:
ASA: Watchdog traceback in SSH thread
Description:

Symptom:
Under rare conditions, an ASA may generate a traceback and reload in the SSH thread.

Conditions:
The traceback occurs when an active SSH management session is disconnected during rekey. This rekey can be either data or time based.

Workaround:
There is no known workaround at this time.

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
9.1(2)
Known Fixed Releases:
100.10(0.6), 100.8(27.84), 100.8(38.19), 100.8(40.8), 100.8(41.2), 100.8(60.21), 100.9(0.51), 100.9(10.1), 100.9(6.28), 100.9(7.29)
Bug Id:
CSCuq27342
Title:
Traceback and reload triggered by failover configuration
Description:

Symptom:
When configuring a failover interface using the command "failover lan interface " on ASA5585, the ASA might crash with a traceback and reload. The crash would occur righter after the software responds and executes the code for setting up the failover interface. If a crash occurs during normal system operation then it is not due to this bug.

Conditions:
Configure a failover interface using the "failover lan interface " command. The chances of a crash are statistically very low, but may increase if traffic into the CPU from network interfaces is high. In lab testing it was only reproducible on a single instance of 5585 and using ASDM with an HTTP interface to the device to send over the configuration commands. In theory though it could occur through console CLI configuration as well.

Workaround:
The problem is only triggered when configuring a failover interface with the above given command. Once the failover interface configuration is complete, if no crash occurs then the problem will not present itself.

Further Problem Description:
If a coredump is captured, then it can be compared to information in this DDTS to determine with high likelihood whether or not it was due to failover interface configuration.

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
9.1(3), 9.1(4.5), 9.2(2.8)
Known Fixed Releases:
100.11(0.56), 100.11(0.57), 100.12(0.113), 100.12(0.115), 100.13(0.34), 100.13(0.49), 100.13(19.9), 100.13(20.11), 100.13(21.7), 100.13(21.8)
Bug Id:
CSCts72188
Title:
ASA: SSH process may exist after being orphaned from SSH session
Description:

Symptom:
The SSH process may still be running even after the SSH session that spawned the SSH process has closed out on an ASA firewall. CPU spike may be
seen due to these stuck ssh processes.


Conditions:
This was identified on an ASA failover pair running 8.2.4(1)

Workaround:
Failover to the other unit. If this is not a failover pair then reload is the only other option.

Further Problem Description:
Gather the output of the following and open a TAC case.
sh proc | i ssh

ASA# sh proc | i ssh
Mwe 08c2e084 7214a764 7249a300 1 721489b0 7132/8192 listen/ssh
Mwe 08be148b 7181278c 09f8050c 5 718108f8 7312/8192 ssh/timer
Mrd 08899185 7262787c 09f81014 595408460 72620728 26900/32768 ssh Mrd 08899185 726308cc 09f81014 572091828 72629778 26900/32768 ssh Mrd
08899185 72750e94 09f81014 538272393 72749d40 26908/32768 ssh Mrd 08899185 727769cc 09f81014 549586257 7276f878 26900/32768 ssh Mrd 08899185
726e86fc 09f81014 526485007 726e15a8 26900/32768 ssh
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2012-5411 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
8.2(4.1)
Known Fixed Releases:
100.7(13.73), 100.7(6.78), 100.8(0.128), 100.8(11.20), 100.8(27.7), 100.8(33.4), 100.8(34.1), 100.9(0.1), 100.9(2.1), 8.2(5.29)
Bug Id:
CSCuo19916
Title:
ASA - Cut Through Proxy sends empty redirect w/ Virtual HTTP and Telnet
Description:

Symptom:
When using cut-through-proxy, virtual http, and virtual telnet on an ASA, clients may receive 302
Moved responses for the redirect that contain no location. With some browsers (confirmed on
IE9), this behavior causes the client to continuously reset and restart the connection which results
in a DOS situation for the ASA and any associated syslogs servers due to thousands of
connection builds/teardowns within very short period of time.

Conditions:
1. Must be using cut-through-proxy on the ASA
2. Must have a virtual HTTP configured as the redirect destination IP in the authentication proxy
ACL
3. Must also have virtual telnet configured on the ASA with the same IP as virtual HTTP

Workaround:
1. Disable virtual telnet (host will still not get the login page but authentication will be successful)
2. Utilize the aaa authentication listener with the redirect keyword and trigger the authentication
based on regular HTTP traffic traversing the ASA and do not redirect to the virtual HTTP address
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
8.4(7), 9.1(2)
Known Fixed Releases:
100.10(0.95), 100.10(12.8), 100.10(17.1), 100.10(2.18), 100.10(6.0.40), 100.10(7.8), 100.11(2.4), 100.11(3.3), 100.11(5.3), 100.11(6.1)
Bug Id:
CSCuo58584
Title:
Cisco ASA fix for CSCun56954
Description:

Symptom:
This bug is tracking the necessary change on the ASA side to fix a vulnerability in the FirePOWER services.
For additional info refer to the Cisco Security Advisory: Cisco ASA FirePOWER Services and Cisco ASA CX Services Crafted Packets Denial of
Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-cxfp

Conditions:
See Cisco Security Advisory

Workaround:
See Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
17-JUN-2015
Known Affected Releases:
9.2(1)
Known Fixed Releases:
100.11(0.54), 100.12(0.98), 100.12(23.4), 100.12(24.3), 100.13(0.11), 100.13(1.3), 100.13(11.19), 100.13(12.40), 100.13(16.18), 100.13(18.7)
Bug Id:
CSCut11895
Title:
Failover assembly remained in active-active state permanantly
Description:

Symptom:
Both the primary and secondary ASA assume the active role simultaneously until a manual reload is executed

Conditions:
The problem was encountered while applying a test load of 750 vpn sessions using tls1.2 with ECDHE-ECDSA-AES256-SHA384.
Another test scenario was when the Primary ASA was power-cycled.

Workaround:
Disable and enable failover again on the secondary unit or reload secondary unit.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
100.13(0.32), 9.4(0.113)
Known Fixed Releases:
100.11(0.57), 100.12(0.116), 100.13(0.51), 100.13(21.9), 100.14(0.4), 100.14(1.3), 100.14(10.7), 100.14(11.7), 100.14(2.9), 100.14(26.4)
Bug Id:
CSCus11465
Title:
ASA teardown connection after receiving same direction fins
Description:

Symptom:
ASA version 9.2.2.4 or 9.3.1 will teardown tcp connection after it receiving fin ack fin ack of the same direction

Conditions:
ASA version 9.2.2.4 or 9.3.1
receiving fin ack fin ack of the same direction

Workaround:
using tcp bypass

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
9.2(2), 9.3(1)
Known Fixed Releases:
100.11(0.55), 100.12(0.111), 100.13(0.22), 100.13(19.9), 100.13(20.10), 100.13(21.7), 100.14(0.2), 100.14(1.2), 100.14(12.1), 100.14(2.1)
Bug Id:
CSCue31900
Title:
Flapping the CCL or Data spanned port-channel causes intermittent crash
Description:

I have an ASA cluster in routed, multi-context, spanned Po mode. When flapping
either the CCL or spanned data etherchannel it can crash.

Workaround:
This issue is related to having open telnet sessions. A workaround is to use SSH.




Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
9.0(1), 9.0(1.107)
Known Fixed Releases:
100.10(0.6), 100.8(27.86), 100.8(38.15), 100.8(40.4), 100.8(41.2), 100.8(60.7), 100.9(0.43), 100.9(6.19), 100.9(7.21), 9.0(2.100)
Bug Id:
CSCte69623
Title:
df election in pim bidir mode fails after failover to secondary unit
Description:

Symptom:
ASA in PIM bidir mode. It has 3 networks, and shows df neighbors properly on all networks. After that, failover is triggered. The new active ASA only sees 2 df neighbors.

Conditions:
PIM bidir mode, after a failover. This issue was seen once a long time ago and has not surfaced since.

Workaround:
Reboot the new active ASA.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
8.2(1.192)
Known Fixed Releases:
Bug Id:
CSCui40499
Title:
ICMP inspection closes TCP conns with "Flow closed by inspection"
Description:

Symptom:
This DDTS is a Duplicate of CSCuh13899

The ASA might tear down TCP connections with this syslog:

Jul 31 2013 10:45:27: %ASA-6-302014: Teardown TCP connection 163 for
outside:10.1.100.4/62750(LOCAL\cisco) to dmz:14.36.103.220/5901 duration 0:00:05 bytes
1382784 Flow closed by inspection (cisco)

Conditions:

Workaround:

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
8.4(5.7), 9.0(2.3), 9.1(1.5)
Known Fixed Releases:
Bug Id:
CSCus51289
Title:
ASA: Traceback when removing manual NAT rule
Description:

Symptom:
ASA: Traceback when removing manual NAT rule

Conditions:
The user must be removing a manual NAT rule from the configuration with the following characteristics:

1. The destination portion of the rule must contain an object with a large range of addresses
and
2. The rule must contain a service object

An example rule that may trigger this crash is:

object network src
host 192.168.10.1
object network dest
range 10.0.0.0 10.255.255.255
object service port
service tcp source eq 80
nat (inside,outside) source static src src destination static dest dest service port port
no nat (inside,outside) source static src src destination static dest dest service port port

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
8.4(5), 9.1(6)
Known Fixed Releases:
100.11(0.55), 100.12(0.111), 100.13(0.22), 100.13(19.9), 100.13(20.10), 100.13(21.7), 100.14(0.2), 100.14(1.2), 100.14(12.1), 100.14(2.1)
Bug Id:
CSCus64082
Title:
ASA fails to sync objects with name ANY after upgrade from 8.4 to 9.x
Description:

Symptom:
Standby ASA fails to sync objects with name ANY used in ACE after the zero downtime upgrade from 8.4.x/8.6.x to 9.x.

The below errors are seen on the console during the configuration replication:
ERROR: specified object does not exist
ERROR: object () does not exist.

Due to missing configuration the standby ASA may enter into a boot loop.

Conditions:
ASA configured with object name ANY and that object is used in an access-list.

object network ANY
subnet 0.0.0.0 0.0.0.0

access-list outside-in extended permit tcp object ANY host

Workaround:
1. Use any other object name apart from 'ANY'
2. Rather than using object name 'ANY' use keyword 'any' in ACL configuration
3. Upgrade both the ASAs at the same time

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
17-JUN-2015
Known Affected Releases:
9.1(2), 9.1(5)
Known Fixed Releases:
100.11(0.56), 100.8(40.95), 9.0(4.31), 9.1(6.2), 9.2(3.101)
Bug Id:
CSCuc75090
Title:
Crypto IPSec SA's are created by dynamic crypto map for static peers
Description:

Symptom:
When a static VPN peer adds any traffic to the crypto ACL, an SA is built even though the IP pair is not allowed in the crypto acl at the main side. Those SA's are eventually matched and
setup by the dynamic crypto map instance.
Conditions:
This was a intended design since day one that enabled customers to fall through in case of static crypto map didn't provide a needed crypto services.
The SA need to be initiated from a statically configured peer and a dynamic crypto map instance must be configured on the receiving end.
Workaround:
N/A

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:P/I:N/A:N/E:F/RL:W/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
18-JUN-2015
Known Affected Releases:
8.2(5), 8.4(4.9)
Known Fixed Releases:
100.7(13.110), 100.7(6.106), 100.8(27.30), 100.8(38.4), 100.8(50.15), 100.9(0.20), 100.9(4.1), 100.9(7.1), 100.9(9.1), 8.2(5.39)
Bug Id:
CSCto32012
Title:
Routing: page fault traceback in Thread Name: EIGRP-IPv4: PDM
Description:

Symptom:

Traceback in routing: page fault crash in Thread Name: EIGRP-IPv4: PDM, eip meth_ch_ioctl

Conditions:

Standby firewall and config sync during reload

Workaround:

When performing an hitless upgrade, before rebooting the standby unit, on the standby unit (secondary):
1. Remove the EIGRP process (by "no router eigrp" command).
2. Do a write mem on the secondary (standby)
3. Reload the standby
4. Upon loading the new image in the standby unit, the config sync from the active will take place (without traceback); since the config is synced, EIGRP will get enabled on the standby unit as well after the sync.
5. Make the secondary unit (with the new image) the active
6. Remove the EIGRP process from the primary (the new standby)
7. Do a write mem
8. Reload the standby
9. Upon loading the new image in the standby unit (primary), the config sync from the active (secondary) will take place.
10. Make the primary active again.

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
8.2(4), 8.4(2)
Known Fixed Releases:
100.7(13.77), 100.7(6.79), 100.8(0.139), 100.8(11.22), 100.8(27.7), 100.8(33.6), 100.8(34.1), 100.8(36.1), 100.9(0.1), 100.9(2.1)
Bug Id:
CSCuq62597
Title:
ASA L2TP Split-Tunnel DHCPC: DHCP daemon got msg for uninitialized
Description:

Symptom:
While connecting to ASA using L2TP and with split-tunnel configured you may see in "debug dhcpd packet 255" and "debug dhcpd event 255" following message:
DHCPC: DHCP daemon got msg for uninitialized context.

or

DHCPD: checking for expired leases.
DHCPD: illegal hardware address length (6).
DHCPD: cannot determine client hardware address.
DHCP: Unable to load workspace.

Conditions:
When configuring L2TP over IPSec with split-tunnnel, add "intercept-dhcp enable" will generate debug error messages as decribed in the "Symptoms" section.

Workaround:
There are two workarounds for this issue:
1. dhcprelay timeout
2. Uses "intercept-dhcp enable" under group-policy.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
9.1(5), 9.2(2.4)
Known Fixed Releases:
100.11(0.49), 100.12(0.57), 100.13(0.4), 100.13(11.6), 100.13(12.10), 100.13(13.1), 100.13(14.3), 100.13(15.4), 100.13(16.1), 100.13(17.1)
Bug Id:
CSCuq99821
Title:
ASA/ASASM drops SIP invite packets with From field containing "" and \
Description:

Symptom:
ASASM running version 9.1.4.6 with SIP inspection turned on, silently drops SIP INVITES that has the similar value in the from field:

"\"210*******\"" ;tag=SD7osu201-gK0d0f565b

Conditions:
ASA/ASASM running 9.1.4.6 with SIP inspection turned on.

Workaround:
disable SIP inspection.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
9.1(4.6)
Known Fixed Releases:
100.11(0.58), 100.12(0.122), 100.13(0.67), 100.13(21.13), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.41), 100.14(5.13)
Bug Id:
CSCuu67159
Title:
ASA: crash in DATAPATH-2-1157
Description:

Symptom:
ASA crashed while configuring routing in context

Conditions:
ASA in multicontext mode

Workaround:
none

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
9.1(5)
Known Fixed Releases:
Bug Id:
CSCto84937
Title:
Potential Dynamic NAT TCP Handshake Race Condition
Description:

Symptom:
ASA configured to use dynamic NAT appears to allow an inbound TCP handshake to complete under certain circumstances:

1) ACL that permits TCP traffic from outside to inside.

2) This packet sequence:

Host A inside firewall, Host B outside firewall

* Host A sends a SYN packet from port X to Host B.
* Host B replies with a RST/ACK to Host A.
* Host B sends a SYN to Host A on port X.
* Host A replies with a SYN/ACK to Host B.

Conditions:
Cisco ASA configured with NAT.

Workaround:
This is NOT a bug.

NAT on ASA is used to do address/port translation. It does
*not* do access-control. Access-list on the ASA is used to do L2-L4
access-control. TCP normalizer is used to do protocol enforcement.
I want to mention this to ensure we don't muddle NAT,
access-control, and protocol enforcement.

Two, the observed behavior in CSCto84937 is known as ''endpoint
independent''. To see a justification, see RFC4787. It is
pretty heavy reading, so let me see if I can make it simpler.

Using the '':

/ notation, assume the *first*
inside session creates this PAT binding.

source ''inside:I/i'' translates into source ''outside:G/g''

This binding will live on the ASA for at least 30 seconds. A host
on the outside can connect outside:G/G and have such connection be
translated to ''inside:I/i'' *only* *only* if such connection is
permitted by access-list. This is nearly identical in the case of
no NAT; except that the first packet must be from the inside.

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Terminated
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
8.4(1)
Known Fixed Releases:
Bug Id:
CSCuo08511
Title:
ASA 9.0.4.1 traceback in webvpn datapath
Description:

Symptom:
ASA reload unexpectedly at random times

Conditions:
Crash due to Webvpn-datapath

Workaround:
NONE

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
18-JUN-2015
Known Affected Releases:
9.0(4.1)
Known Fixed Releases:
100.10(0.88), 100.10(2.13), 100.10(6.16), 100.10(7.3), 100.11(0.6), 100.11(5.1), 100.7(6.131), 100.8(40.68), 100.8(56.49), 100.8(64.15)
Bug Id:
CSCup47885
Title:
ASA: Page fault traceback in DATAPATH when DNS inspection is enabled
Description:

Symptom:
An ASA may generate a traceback and reload in the DATAPATH thread while processing DNS traffic when DNS inspection is enabled.

Conditions:
The ASA must be running 9.1.5.7 or higher.
This issue will trigger when we do DNS reverse loop up with DNS inspection enabled.

When a customer do reverse look up on IP addresses and receives a PTR Reply with more number of records they will hit this issue.
This issue will not be seen without reverse loop up

Workaround:
There is no known workaround at this time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
9.1(5.7), 9.2(2)
Known Fixed Releases:
100.11(0.37), 100.11(5.46), 100.11(6.8), 100.12(0.19), 100.12(1.13), 100.12(10.4), 100.12(12.4), 100.12(13.11), 100.12(15.4), 100.12(16.9)
Bug Id:
CSCur98502
Title:
ASA: 'no monitor-interface service-module' command gone after reload.
Description:

Symptom:
'no monitor-interface service-module' gone from configuration.

Conditions:
ASA 9.3(1) with failover configuration. 'no monitor-interface service-module' configured and ASA reloaded.

Workaround:
Avoid reloading ASA or put the command manually after reload.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
9.3(1)
Known Fixed Releases:
100.11(0.55), 100.12(0.110), 100.13(0.15), 100.13(1.34), 100.13(16.31), 100.13(19.9), 100.13(20.5), 100.13(21.5), 100.13(23.3), 100.13(24.3)
Bug Id:
CSCsi28027
Title:
Crash/hang after receiving fragmented ping over EOBC channel
Description:

Symptom:

The device will crash or hang and then reload if it receives a fragmented
ICMP message on the EOBC port. The ICMP packets can be
sent from the Supervisor or another line card in the chasis.


Conditions:

The device must receive a fragmented ICMP message on the EOBC port.


Workaround:

None.

Status:
Terminated
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
7.0
Known Fixed Releases:
Bug Id:
CSCus78450
Title:
Certificate Validation Failure after upgrade post 9.1.5(12)
Description:

Symptom:
--Certificate Validation Failure message on user PC after upgrading the ASA to any version in 9.1.5(x) post 9.1.5(12)
--The debug crypto ca 255 shows the following message:
CRYPTO_PKI: Certificate validation: Failed, status: 530CRYPTO_PKI: PKI Verify Cetificate Check Cert Revocation unknown error 530
CRYPTO_PKI: PKI Verify Certificate error. No trust point found

Conditions:
ASA running any version above 9.1.5(12) using server-side certificate authentication with ID certificate issued by a third party CA.

Workaround:
--Remove all the configured trustpoints and re-build them by importing the chain.
--Use a self-signed certificate

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
9.1(5.16)
Known Fixed Releases:
100.11(0.58), 100.12(0.120), 100.13(0.62), 100.13(21.12), 100.13(28.2), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11), 100.14(2.21)
Bug Id:
CSCuu55006
Title:
ASA:Traceback with Thread Name Checkheaps when object-group is modified
Description:

Symptom:
ASA 5515 running version code 9.1(3) may generate a traceback with Thread Name: Checkheaps when an object-group is modified.

Conditions:
Observed on ASA 5515 with CX module inline

Workaround:
none

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.1(3)
Known Fixed Releases:
Bug Id:
CSCun26772
Title:
Invalid user names are logged in syslogs
Description:

Symptom:
ASA logs invalid user name in their logs when user attempt to authenticate with incorrect user-id.

Conditions:
AAA and logging enabled

Workaround:

Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or
involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please
contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.2(0.2)
Known Fixed Releases:
100.10(9.6), 100.11(2.1), 100.8(38.125), 100.8(40.63), 100.8(56.31), 100.8(65.4), 9.0(4.25), 9.1(5.15), 9.2(0.99), 9.2(1)
Bug Id:
CSCuq34213
Title:
Double Free when processing DTLS packets
Description:

Symptom:
This product includes a version of OpenSSL that could be affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

* Double Free when processing DTLS packets (CVE-2014-3505)

This bug has been opened to investigate and address the potential impact on this product.

Conditions:
Cisco ASA running release 8.2.1 or later with a default configuration.

Workaround:
None.

Further Problem Description:
This bug is one of 9 disclosed by the OpenSSL organization as part of their August advisory (see https://www.openssl.org/news/secadv_20140806.txt for details).

1. Double Free when processing DTLS packets (CVE-2014-3505)
2. DTLS memory exhaustion (CVE-2014-3506)
3. DTLS memory leak from zero-length fragments (CVE-2014-3507)
4. Information leak in pretty printing functions (CVE-2014-3508)
5. Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
6. OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
7. OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
8. SRP buffer overrun (CVE-2014-3512)
9. Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)

Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html

Only numbers 1 and 3 were found to be vulnerabilities in the ASA and were resolved with bugs:

CSCuq34213 Double Free when processing DTLS packets
CSCuq34226 OpenSSL Zero-Length Fragments DTLS Memory Leak Denial of Service Vuln

The remaining issues have bugs created but have been junked as the ASA was found to not be vulnerable:

CSCuq34216 OpenSSL DTLS Memory Exhaustion Denial of Service Vulnerability
CSCuq34229 OpenSSL Pretty Printing Functions Stack Information Disclosure Vuln
CSCuq34234 OpenSSL ssl_parse_serverhello_tlsext Race Condition Vulnerability
CSCuq34299 OpenSSL DTLS Anonymous ECDH Denial of Service Vulnerability
CSCuq34304 OpenSSL TLS Protocol Downgrade Man-in-the-Middle Vulnerability
CSCuq34311 OpenSSL SRP Buffer Overflow Denial of Service Vulnerability
CSCuq34313 OpenSSL SRP Ciphersuite Denial of Service Vulnerability

Cisco Adaptive Security Appliance (ASA) Software v9.0.4 and later is NOT impacted by this bug.

Due to End of Life, this bug will not be fixed in the 8.0 and 8.1 code trains. Cisco recommends that customers upgrade to a fixed release.

Cisco Adaptive Security Appliance (ASA) Software v7.x is NOT impacted by these vulnerabilities.


PSIRT Evaluation:
The Cisco PSIRT has assessed these vulnerabilities using the Base and Temporal CVSS scores from the National Vulnerability Database (NVD).

Details about the third-party software vulnerabilities listed above, as well as their CVSS score can be found at the following URL:
http://web.nvd.nist.gov/view/vuln/search

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
100.12(10), 8.2(5.50), 8.3(2.41), 8.4(7.22), 8.6(1.14), 8.7(1.12), 9.1(5.11), 9.2(2.4), 9.3(1)
Known Fixed Releases:
100.11(0.42), 100.12(10.32), 100.12(21.2), 100.12(9.13), 100.7(6.134), 100.8(40.83), 8.3(2.43), 8.4(7.23), 9.0(4.22), 9.1(5.13)
Bug Id:
CSCua92556
Title:
ASA sip inspect - Pre-allocate SIP NOTIFY TCP secondary channel
Description:

Symptom:
ASA Creates multiple duplicate secondary pinholes

TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:00:20, bytes 0, flags Ti
TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:02:20, bytes 0, flags Ti
TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:04:20, bytes 0, flags Ti
TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:06:20, bytes 0, flags Ti
TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:08:20, bytes 0, flags Ti
TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:10:20, bytes 0, flags Ti
TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:12:20, bytes 0, flags Ti
TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:14:20, bytes 0, flags Ti
TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:16:19, bytes 0, flags Ti
TCP outside 10.234.87.4:2436 inside 10.19.10.7:0, idle 0:18:19, bytes 0, flags Ti


Conditions:

Sip inspection should be enabled on ASA


Workaround:

None

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
8.2(4.4)
Known Fixed Releases:
100.7(13.95), 100.7(6.91), 100.8(0.223), 100.8(11.34), 100.8(27.19), 100.8(33.18), 100.8(34.1), 100.8(36.3), 100.9(0.1), 100.9(3.3)
Bug Id:
CSCuf68858
Title:
ASA: Page fault traceback in dbgtrace when running debug in SSH session
Description:

Symptom:

When running debugs from 2 different SSH sessions, the ASA may generate a traceback and reload in the dbgtrace thread when one of the SSH sessions closes.

Conditions:

This issue occurs when 2 SSH sessions have enabled debugs and one session disconnects while the debug is still running.

Workaround:

Disable debugs with the 'undebug all' command before closing the SSH session.

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
8.4(5), 8.4(5.7)
Known Fixed Releases:
100.10(0.6), 100.7(6.117), 100.8(27.83), 100.8(40.3), 100.8(41.1), 100.8(60.7), 100.9(0.41), 100.9(6.17), 100.9(7.20), 8.4(6.1)
Bug Id:
CSCur54943
Title:
Linux Kernel KVM Subsystem invept Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-3645

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.7:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-3645 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCun69561
Title:
ASA Crafted Radius DoS Vulnerability
Description:

Symptom:
ASA crash in thread name radius_rcv_auth

Conditions:
ASA receives a RADIUS packet with a crafted attribute value during a radius exchange. Knowledge of the shared key is needed in order to exploit the vulnerability

Workaround:
none

Further Problem Description:
A vulnerability in the implementation of the RADIUS code of Cisco ASA
Software could allow an authenticated, remote attacker to cause the reload
of the affected system.

The vulnerability is due to insufficient validation of RADIUS packets
including crafted attributes. . An attacker could exploit this vulnerability
by sending crafted RADIUS packets to the affected system.
The attacker needs to know the RADIUS shared secret and inject the crafted
packet while a RADIUS exchange is in progress.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.3/5.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2014-3264 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3264

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.0(1), 9.1(1), 9.2(0.3)
Known Fixed Releases:
100.10(0.87), 100.10(2.13), 100.10(6.16), 100.10(7.3), 100.11(2.1), 100.11(5.1), 100.8(38.133), 100.8(40.68), 100.8(56.47), 100.8(64.14)
Bug Id:
CSCur68845
Title:
Linux Kernel Networking recvmsg Memory Leak Local Information Disclosu
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-6405

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:P/I:P/A:N/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-6405 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCud16590
Title:
ASA may traceback in thread emweb/https
Description:

Summary

Cisco ASA Software is affected by the following vulnerabilities:

IKE Version 1 Denial of Service Vulnerability
Crafted URL Denial of Service Vulnerability
Denial of Service During Validation of Crafted Certificates
DNS Inspection Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of these vulnerabilities.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa

Note: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers may be affected by some of
the vulnerabilities listed above. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the Cisco
FWSM. This advisory is available at

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/7.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C

CVE ID CVE-2013-1150 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
8.4(5)
Known Fixed Releases:
100.7(13.108), 100.7(6.104), 100.8(11.49), 100.8(27.25), 100.8(34.1), 100.8(38.3), 100.8(50.3), 100.9(0.6), 7.2(5.9), 8.0(5.29)
Bug Id:
CSCur68866
Title:
QEMU virtqueue_map_sg() Function Input Validation Buffer Overflow Vuln
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-4535

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.0:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:H/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-4535 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCuu74125
Title:
ASA traceback in thread name: DATAPATH
Description:

Symptom:
ASA reloads due to a traceback in thread name: DATAPATH

Conditions:
unknown

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.3(2.160)
Known Fixed Releases:
Bug Id:
CSCue02226
Title:
ASA 9.1.1 - WCCPv2 return packets are dropped
Description:

Symptom:

When using WCCPv2, traffic returned from IronPort to ASA 9.1.1 in GRE tunnel is being dropped on ASA


1. SYN packet sent from User's PC reaches the ASA inside interface,

2. then using GRE the SYN packet is redirected from ASA to IronPort,

3. next, when the packet is returned back from IronPort to ASA in GRE, but ASA drops it with "Drop-reason: (no-route) No route to host".


Conditions:
ASA 9.1.1
IronPort used for http/https traffic inspection


Workaround:
Disable Bypass on IronPort or exclude specific traffic from ACL that redirects traffic to IronPort.
or
Enable management-access on ASA on the interface with highest IP address.

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.1(1)
Known Fixed Releases:
100.8(27.63), 100.8(60.1), 100.9(0.36), 100.9(4.5), 100.9(6.11), 100.9(7.19), 9.0(2.100), 9.0(2.7), 9.0(3), 9.1(1.101)
Bug Id:
CSCtr39013
Title:
ASA - panic traceback when issuing show route interface_name
Description:

Symptom:
Under very rare conditions, the ASA may crash due to doing show route interface_name IP_address netmask command.

Conditions:
ASA running 8.2.5 or 8.4.2 code.

Workaround:
Do not use the more specific route command. You are able to view the route table by doing show route.

Further Problem Description
The following forms of "show route" commands may result in a crash
show route
show route outside
show route inside 192.168.0.0 255.255.0.0
Other forms of show route though not tested may result in a crash as well.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
8.0(3), 8.2, 8.2(4.11), 8.2(5), 8.3(2.13), 8.4(2)
Known Fixed Releases:
100.7(13.21), 100.7(14.10), 100.7(17.5), 100.7(18.1), 100.7(6.44), 100.7(8.34), 100.7(9.53), 100.8(0.17), 100.8(10.20), 100.8(12.23)
Bug Id:
CSCum55917
Title:
ASA Traceback in Thread Name: fover_fail_check
Description:

Symptom:
ASA may run into a 1550 block depletion and trigger a assert traceback in thread name: fover_fail_check

Conditions:
ASA running release 9.0.3 (specific conditions are under investigation) or release 9.1.4 with DHCP relay enabled.

Workaround:
In the case where DHCP relay is configured, disabling DHCP relay may keep the issue from occurring.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.1(4)
Known Fixed Releases:
Bug Id:
CSCui41969
Title:
Authentication is successful, but http browser with error msg displayed
Description:

Symptom:
Sometime custmer's screen displayed reject message (" Authentication Rejected! Please
contact I.T. Department " ) after reloading ASA (after multiple times reloading or clear uauth) , but in
fact authentication is ok . You can see:

Show uauth" is OK tufw05# sho uauth
Current Most Seen
Authenticated Users 1 1
Authen In Progress 0 2
user 'tualan' at 172.31.16.124, authenticated
access-list acl_itnetadm (*)
absolute timeout: 18:00:00
inactivity timeout: 1:15:00

Conditions:
Reloading asa mulitple times

Workaround:
If the issue happens, "clear uauth" or reload asa again.

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
8.6(1.10)
Known Fixed Releases:
100.11(0.55), 100.12(0.111), 100.13(0.15), 100.13(1.36), 100.13(1.38), 100.13(19.9), 100.13(21.6), 100.13(23.4), 100.13(23.5), 100.13(24.4)
Bug Id:
CSCtr33200
Title:
ASA may traceback when looking at routing table
Description:

Symptom:
In certain rare cases, the ASA may crash when looking at the routing table using the output of "show route".

Conditions:
This was observed on an ASA running both Webvpn and L2L tunnels.

Workaround:
None.

Status:
Other
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
8.3(2.13)
Known Fixed Releases:
Bug Id:
CSCuu82278
Title:
ASA traceback in Thread Name: tmatch compile thread
Description:

Symptom:
ASA can crash in Thread Name: tmatch compile thread.

CPU hogs for Process: 'tmatch compile thread' can be seen the time around the ASA crash.

Conditions:

Workaround:

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.1(6)
Known Fixed Releases:
Bug Id:
CSCta02170
Title:
ASA5550 or ASA with 4GE-SSM may crash due to block corruption
Description:

Symptom:

ASA reloads due to block corruption.

Conditions:

ASA5550 or ASA with 4GE I/O module running 8.2.1 code and using interfaces in slot 0 and slot 1.

Workaround:

Do not use interfaces in slot 1 since this triggers the problem.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

CVE ID CVE-2012-5726 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
8.2(1)
Known Fixed Releases:
100.3(0.10), 100.3(0.13), 100.4(0.18), 8.2(1.100), 8.2(1.102), 8.2(1.12), 8.2(4), 8.3(0.0)
Bug Id:
CSCui77398
Title:
Cisco ASA Crafted ICMP Packet Denial of Service Vulnerability
Description:

Summary

Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability
SQL*Net Inspection Engine Denial of Service Vulnerability
Digital Certificate Authentication Bypass Vulnerability
Remote Access VPN Authentication Bypass Vulnerability
Digital Certificate HTTP Authentication Bypass Vulnerability
HTTP Deep Packet Inspection Denial of Service Vulnerability
DNS Inspection Denial of Service Vulnerability
AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability
Clientless SSL VPN Denial of Service Vulnerability
Crafted ICMP Packet Denial of Service Vulnerability


These vulnerabilities are independent of one other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability, SQL*Net Inspection Engine Denial of Service
Vulnerability, HTTP Deep Packet Inspection Denial of Service Vulnerability, DNS Inspection Denial of Service Vulnerability, and Clientless SSL
VPN Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Digital Certificate Authentication Bypass Vulnerability, Remote Access VPN Authentication Bypass Vulnerability,
and Digital Certificate HTTP Authentication Bypass Vulnerability may result in an authentication bypass, which could allow the attacker access to
the inside network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management
(ASDM).

Successful exploitation of the AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability may exhaust available memory, which could
result in general system instability and cause the affected system to become unresponsive and stop forwarding traffic.

Successful exploitation of the Crafted ICMP Packet Denial of Service Vulnerability may result in valid connections passing through or directed to
the affected system to be torn down or cause a reload of the system, leading to a denial of service (DoS) condition.

Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of the vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa

Note: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers may be affected by the
SQL*Net Inspection Engine Denial of Service Vulnerability. A separate Cisco Security Advisory has been published to disclose the vulnerabilities
that affect the Cisco FWSM. This advisory is available at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are
8.5/7.0:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:P/A:C/E:F/RL:OF/RC:C
CVE ID has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
8.4(7), 9.0(3), 9.0(3.2), 9.1(2.101), 9.1(2.7), 9.1(3.249)
Known Fixed Releases:
100.10(0.14), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.7(13.118), 100.7(6.122), 100.8(38.33), 100.8(40.22), 100.8(41.2), 100.8(45.2)
Bug Id:
CSCuu87823
Title:
ASAv traceback in DATAPATH when used for WebVPN
Description:

Symptom:
ASAv traceback in DATAPATH when used for WebVPN

Conditions:
ASAv running release 9.4.1 and configured for WebVPN

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.4(1)
Known Fixed Releases:
Bug Id:
CSCui61335
Title:
Traceback in Thread: DATAPATH-3-1281 Page fault: Address not mapped
Description:

Symptom:
ASA crashes when syncing with cluster master:

Thread Name: DATAPATH-0-1267
Page fault: Address not mapped

Conditions:
ASA configured in cluster. Slave synching with cluster master

Workaround:
Other than disabling the cluster member,l none at this time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.1(2)
Known Fixed Releases:
100.10(0.16), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.8(38.37), 100.8(40.24), 100.8(41.2), 100.8(45.2), 100.8(46.3), 100.8(49.1)
Bug Id:
CSCui06108
Title:
LU allocate xlate failed after Standby ASA traceback
Description:

Symptom:
The %ASA-3-210007: LU allocate xlate failed syslog message appears after a failure (traceback) on the Standby unit.

Conditions:
Cisco ASA running release 9.0.2.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
19-JUN-2015
Known Affected Releases:
9.0(2), 9.1(4)
Known Fixed Releases:
100.10(0.20), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.8(38.43), 100.8(40.28), 100.8(41.2), 100.8(45.4), 100.8(46.5), 100.8(48.1)
Bug Id:
CSCue46275
Title:
Connections not timing out when the route changes on the ASA
Description:

Symptom:
Connections on the ASA are not timing out after a route change

Conditions:
timeout floating-conn was set to 30 seconds

Workaround:
clear out the connections manually

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
8.2(5), 8.3(2), 8.4(5), 9.0(1), 9.1(1)
Known Fixed Releases:
100.10(0.6), 100.7(6.119), 100.8(27.84), 100.8(38.20), 100.8(40.9), 100.8(41.2), 100.8(60.24), 100.9(0.52), 100.9(10.1), 100.9(6.28)
Bug Id:
CSCus89013
Title:
Multiple Child SAs created
Description:

Symptom:
Multiple Child SA creatted

BXB-3-5520-ASA3(config)# show crypto isakmp sa

There are no IKEv1 SAs

IKEv2 SAs:

Session-id:65, Status:UP-ACTIVE, IKE count:1, CHILD count:903

Tunnel-id Local Remote Status Role
162705863 80.1.1.1/500 70.1.1.1/500 READY RESPONDER
Encr: AES-CBC, keysize: 256, Hash: SHA96, DH Grp:5, Auth sign: PSK, Auth verify: PSK
Life/Active Time: 86400/5804 sec
Child sa: local selector 90.1.1.11/0 - 90.1.1.11/65535
remote selector 60.1.1.11/0 - 60.1.1.11/65535
ESP spi in/out: 0x3c02014/0x23cc61ca
Child sa: local selector 90.1.1.11/0 - 90.1.1.11/65535
remote selector 60.1.1.11/0 - 60.1.1.11/65535
ESP spi in/out: 0x755d4447/0x1f426716
Child sa: local selector 90.1.1.11/0 - 90.1.1.11/65535
remote selector 60.1.1.11/0 - 60.1.1.11/65535
ESP spi in/out: 0xb196ff93/0x9fbacd9c
Child sa: local selector 90.1.1.11/0 - 90.1.1.11/65535
remote selector 60.1.1.11/0 - 60.1.1.11/65535
ESP spi in/out: 0xba728d67/0x6e159e3d
Child sa: local selector 90.1.1.11/0 - 90.1.1.11/65535
remote selector 60.1.1.11/0 - 60.1.1.11/65535
ESP spi in/out: 0xec951076/0x4d20bdd6
Child sa: local selector 90.1.1.11/0 - 90.1.1.11/65535
remote selector 60.1.1.11/0 - 60.1.1.11/65535
ESP spi in/out: 0x80dc69fe/0x9a072e95
Child sa: local selector 90.1.1.11/0 - 90.1.1.11/65535
remote selector 60.1.1.11/0 - 60.1.1.11/65535
ESP spi in/out: 0xc719b56e/0xf1e350a3
Child sa: local selector 90.1.1.11/0 - 90.1.1.11/65535
remote selector 60.1.1.11/0 - 60.1.1.11/65535
ESP spi in/out: 0x4ebdbb5d/0x89d5e9c2

Conditions:
Create a crypto map with two sequence number and then try to connect via 2nd sequence number. Make 1st sequence number not matching on both peers

Workaround:
Connect via crypto map's first sequence number

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
Bug Id:
CSCus62863
Title:
Kenton 5516: Interface dropping ARPs after flapping under traffic load
Description:

Symptom:
5506 drops packets under load.

Conditions:
5506 running 9.4.1 may experience interface flaps under load, resulting in packet loss.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
100.13(0.16), 9.4(0.53), 9.4(1)
Known Fixed Releases:
100.12(0.125), 100.13(0.74), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.36), 100.14(7.30), 100.15(0.11), 100.15(1.5)
Bug Id:
CSCue97782
Title:
ASA: Old connections tear down IPsec VPN tunnel on switchover
Description:

Symptom:

L2L IPsec VPN can flap in case of redundant topology, such as shown below:

+ out1 ---\
inside ASA -| ISP--- Peer
+ out2 ---/

Conditions:

This may happen in all ASA versions when ISP fails and IP SLA is used to change routing. Routing change causes existing tunnel teardown and new tunnel reestablishment. New TCP or UDP connections will be opened over new tunnel, but old TCP or UDP connections remain in the ASA connection table pointing to the old interface. This may sometimes trigger reestablishment of VPN tunnel when traffic is sent over these old connections.

Workaround:

None.

Status:
Other
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
8.3(2), 9.0(1), 9.1(1)
Known Fixed Releases:
Bug Id:
CSCuu16907
Title:
ASA: Watchdog traceback in DATAPATH
Description:

Symptom:
ASA Watchdog traceback after an upgrade in failover environment.

Conditions:
ASA in failover pair environment, upgraded to 9.1.(5)21.

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
9.1(5.21)
Known Fixed Releases:
Bug Id:
CSCtr63728
Title:
SIP Inspection Media Update Denial of Service Vulnerability
Description:

Symptom:
Cisco ASA 5500 Series Adaptive Security Appliances (ASA) and Cisco Catalyst 6500 Series ASA Services Module (ASASM) may be affected by the following vulnerabilities:

DHCP Memory Allocation Denial of Service Vulnerability
SSL VPN Authentication Denial of Service Vulnerability
SIP Inspection Media Update Denial of Service Vulnerability
DCERPC Inspection Buffer Overflow Vulnerability
Two DCERPC Inspection Denial Of Service Vulnerabilities

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.


Conditions:
See PSIRT Security Advisory.


Workaround
See PSIRT Security Advisory.

Further Problem Description:
See PSIRT Security Advisory.

PSIRT Evaluation:



Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the affected device. Exploitation of the DCERPC Inspection Buffer Overflow Vulnerability could additionally cause a stack overflow and possibly the execution of arbitrary commands.
Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of these vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa

Note: The Cisco Firewall Services Module for Cisco Catalyst 6500 and Cisco 7600 Series (FWSM) may be affected by some of the vulnerabilities listed above.
A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the Cisco FWSM. This advisory is available at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm

The Cisco ASA 1000V Cloud Firewall and Cisco ASA-CX Context-Aware Security are not affected by any of these vulnerabilities.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
8.2(5), 8.4(2)
Known Fixed Releases:
100.7(13.33), 100.7(14.23), 100.7(18.2), 100.7(6.44), 100.7(8.34), 100.8(0.28), 100.8(10.40), 100.8(15.7), 100.8(19.16), 100.8(2.16)
Bug Id:
CSCut67965
Title:
CRYPTO_PKI: ERROR: Unable to allocate new session. Max sessions reached
Description:

Symptom:
ASA running 9.4.1 stops accepting IKEv2 connections.

Conditions:
ASA5545 running 9.4.1 with certificate authentication for Windows Mobile phones. The ASA may print a pki debug message "CRYPTO_PKI: ERROR: Unable to allocate new session. Max sessions reached".

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
20-JUN-2015
Known Affected Releases:
9.4(1)
Known Fixed Releases:
100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.28), 100.14(10.23), 100.14(5.17), 100.14(7.33), 100.15(0.13), 100.15(1.15), 100.15(2.47)
Bug Id:
CSCtf47041
Title:
Active ASA unit tracebacks in Thread Name: ssh
Description:

Symptom:

Active ASA unit tracebacks in Thread Name: ssh

Conditions:

NA

Workaround:

NA

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
8.2(2)
Known Fixed Releases:
100.4(0.50), 100.5(5.10), 100.7(2.4), 8.2(2.10), 8.2(2.99), 8.2(4), 8.3(1.100), 8.3(1.2), 8.4(1)
Bug Id:
CSCuc51614
Title:
Weblaunch of AC IKEv2 connection should re-DAP if NAC is not configured
Description:

Symptom:
DAP re-evaluation is missing during the weblaunch of AnyConnect IKEv2 connection when the client type switches from clientless to the AnyConnect.

Conditions:
The weblaunch of AnyConnect IKEv2 connection without NAC configuration triggers the issue.

Workaround:
None

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
8.4
Known Fixed Releases:
Bug Id:
CSCuu32905
Title:
ASA WebVPN: Javascript fails to execute when accessing internal portal
Description:

Symptom:
On an ASA running WebVPN, when a user clicks on internal portal page, java console logs the error "function expected" in cte.js.

Conditions:
Issue was seen an replicated on ASA 9.1(5.21) and 9.1(6).

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
100.8(40.67), 9.1(6)
Known Fixed Releases:
100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.26), 100.14(10.23), 100.14(5.17), 100.14(7.32), 100.15(0.13), 100.15(1.15)
Bug Id:
CSCuu45813
Title:
ASA Name Constraints dirName improperly verified
Description:

Symptom:
When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension with a dirName constraint, the ASA fails with the error:
CERT-C: I pkixpath.c(2726) : Error #751h
CRYPTO_PKI:Invalid certificate received (status = 1873)
CRYPTO_PKI:Invalid RA certificate received

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
9.1(1), 9.1(2), 9.3(1), 9.4(1)
Known Fixed Releases:
100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.38), 100.15(0.13), 100.15(1.15)
Bug Id:
CSCui53710
Title:
ACL Migration to 8.3+ Software Unnecessarily Expands Object Groups
Description:

Symptom:
When upgrading an Adaptive Security Appliance (ASA) from 8.2 and earlier software to 8.3 and later software, Access Control List (ACL) entries which reference object groups may be fully expanded even when the object group in question is not directly referenced in NAT policies. As the result, ACL sizes may increase significantly and the convenience of using object-groups for rule set management is lost.

Conditions:
A member of the object group is referenced within NAT and/or ACL policies.

Workaround:
Rebuild the ACLs to use object groups after the migration.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
8.3(2), 8.4(1), 8.4(1.50), 8.4(6), 9.0(3), 9.1(2)
Known Fixed Releases:
100.10(0.51), 100.10(2.3), 100.10(3.1), 100.10(9.1), 100.8(38.79), 100.8(40.51), 100.8(46.53), 100.8(51.13), 100.8(56.1), 100.8(56.10)
Bug Id:
CSCuu46569
Title:
ASA CA certificate import fails with different types of Name Constraints
Description:

Symptom:
When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension with a URI or DNS constraint, the ASA fails with the error:
CERT-C: I pkixpath.c(2726) : Error #751h
CRYPTO_PKI:Invalid certificate received (status = 1873)
CRYPTO_PKI:Invalid RA certificate received

Conditions:

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
9.1(1), 9.1(2), 9.3(1), 9.4(1)
Known Fixed Releases:
100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.38), 100.15(0.13), 100.15(1.15)
Bug Id:
CSCut75983
Title:
ASA Traceback in PPP
Description:

Symptom:
ASA traceback in ppp_timer_thread.

Conditions:
ASA under heavy traffic. ASA is already dropping VPN tunnels.(Over-subscription of the ASA)

Workaround:
none

Further Problem Description:
ASA reloaded on its own.

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
8.4(7)
Known Fixed Releases:
100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.37), 100.15(0.13), 100.15(1.15)
Bug Id:
CSCur20322
Title:
ASA 9.2.1 - DATAPATH Traceback in L2 cluster environment
Description:

Symptom:
ASA in an L2 cluster environment causes a DATAPATH traceback. The unit comes back up but will not join the cluster and results in an RPC_SYSTEMERROR failure. Manual joining into the cluster causes an immediate crash after entering "enable".

Conditions:
ASA operating in 9.2.1 code and in multi-context.
ASA in a cluster L2 environment.

Workaround:
No workaround at this time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
20-JUN-2015
Known Affected Releases:
9.2(1)
Known Fixed Releases:
100.11(0.57), 100.12(0.118), 100.13(0.58), 100.13(21.11), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13), 100.14(26.5)
Bug Id:
CSCue59676
Title:
ASA shared port-channel subinterfaces and multicontext traffic failure
Description:

Symptom:
An ASA configured in multi context mode, with port-channels divided into subinterfaces, may experience an issue where traffic to certain contexts will fail if the port-channel has more than one active interface member.

Conditions:
To confirm you are hitting this bug, check the output of 'show controller ' for each physical member of the port channel. Affected ASAs will show only the first member in Promiscuous mode and the rest in Disabled.
Out of the 'show controller' depends on the platform of ASA.

Some of the platforms show the output below.

show controller GigabitEthernet 0/0 | i Promiscuous Mode
Unicast Promiscuous Mode: Enabled (5) <----
show controller GigabitEthernet 0/1 | i Promiscuous Mode
Unicast Promiscuous Mode: Disabled (0) <----

And some of the platforms show the output below.

show controller GigabitEthernet 0/0 | i RX Control
RX Control: 0x00007fff18536100 = 0x0440800a
show controller GigabitEthernet 0/1 | i RX Control
RX Control: 0x00007fff18536100 = 0x04408002

First bit of a(1010) means Promiscuous, and 2(0010) means Not Promiscuous.

Traffic failure observed when number of MAC addresses allocated to each interface exceeded the count of RX address array.
RX address array can be seen via "show controller" output.

Workaround:
Reduce the number of contexts or subinterfaces so as count of mac addresses allocated to interfaces not exceed the count of RX address array.
Deleting the context experience the problem and reconfiguring it sometimes resolves the issue for that context, but the problem may then move to another context.

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
22-JUN-2015
Known Affected Releases:
8.4(4.6), 8.4(5)
Known Fixed Releases:
100.7(13.111), 100.7(6.110), 100.8(27.63), 100.8(50.35), 100.9(0.35), 100.9(4.5), 100.9(6.10), 100.9(7.9), 100.9(8.1), 8.4(5.7)
Bug Id:
CSCur68847
Title:
Linux Kernel farsync.c Information Disclosure Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-1444

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:N/C:C/I:N/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-1444 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCts45638
Title:
8.4.2.2: Thread Name: DATAPATH-0-1272 Page fault: Unknown
Description:

Symptom:
ASA may crash unexpectedly due to a traceback.

Conditions:
The problem is related to traffic matching PAT rules.

Workaround:
There is no known workaround. This defect can be matched by TAC after decoding the output of 'show crashinfo'.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
22-JUN-2015
Known Affected Releases:
8.4(2), 8.4(2.2)
Known Fixed Releases:
100.7(13.37), 100.7(14.26), 100.7(17.5), 100.7(18.3), 100.7(6.44), 100.7(8.34), 100.8(0.30), 100.8(0.36), 100.8(0.46), 100.8(0.54)
Bug Id:
CSCur68848
Title:
Linux Kernel KVM Virtual APIC Accesses Local Privilege Escalation Vuln
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-6368

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-6368 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68873
Title:
Linux Kernel Reliable Datagram Sockets Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-7339

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.7:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-7339 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCuj82692
Title:
ASA 8.4.7 - Traceback with assertion in thread name Dispatch Unit
Description:

Symptom:
Standalone ASA traceback in thread name Dispatch Unit

Conditions:
ASA version 8.4.7

Workaround:
not known

Further Problem Description:
ASA crashes during propagation of VOIP traffic. If the VOIP inspections are disabled, the crashes are not seen.

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
8.4(6.3), 8.4(7)
Known Fixed Releases:
100.10(0.63), 100.10(2.4), 100.10(3.1), 100.10(9.1), 100.7(6.127), 100.8(38.94), 100.8(40.56), 100.9(10.23), 8.4(7.8), 9.0(4.1)
Bug Id:
CSCuq34226
Title:
OpenSSL Zero-Length Fragments DTLS Memory Leak Denial of Service Vuln
Description:

Symptom:
The Cisco Adaptive Security Appliance (ASA) Software version 8.2 and later includes a version of OpenSSL that could be affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

* DTLS memory leak from zero-length fragments (CVE-2014-3507)

This bug has been opened to investigate and address the potential impact on this product.

Conditions:
Cisco ASA running release 8.2.1 or later with a default configuration.

Workaround:
None.

Further Problem Description:
This bug is one of 9 disclosed by the OpenSSL organization as part of their August advisory (see https://www.openssl.org/news/secadv_20140806.txt for details).

1. Double Free when processing DTLS packets (CVE-2014-3505)
2. DTLS memory exhaustion (CVE-2014-3506)
3. DTLS memory leak from zero-length fragments (CVE-2014-3507)
4. Information leak in pretty printing functions (CVE-2014-3508)
5. Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
6. OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
7. OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
8. SRP buffer overrun (CVE-2014-3512)
9. Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)

Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html

Only numbers 1 and 3 were found to be vulnerabilities in the ASA and were resolved with bugs:

CSCuq34213 Double Free when processing DTLS packets
CSCuq34226 OpenSSL Zero-Length Fragments DTLS Memory Leak Denial of Service Vuln

The remaining issues had bugs created but have been junked as the ASA was found to be not vulnerable.

Cisco Adaptive Security Appliance (ASA) Software v9.0.4 and later is NOT impacted by this bug.

Due to End of Life, this bug will not be fixed in the 8.0 and 8.1 code trains. Cisco recommends that customers upgrade to a fixed release.

Cisco Adaptive Security Appliance (ASA) Software v7.x is NOT impacted by these vulnerabilities.

PSIRT Evaluation:
The Cisco PSIRT has assessed these vulnerabilities using the Base and Temporal CVSS scores from the National Vulnerability Database (NVD).

Details about the third-party software vulnerabilities listed above, as well as their CVSS score can be found at the following URL:
http://web.nvd.nist.gov/view/vuln/search

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
100.12(10), 8.2(5.50), 8.3(2.41), 8.4(7.22), 8.6(1.14), 8.7(1.12), 9.1(5.11), 9.2(2.4), 9.3(1)
Known Fixed Releases:
100.11(0.42), 100.12(10.32), 100.12(21.2), 100.12(9.13), 100.7(6.134), 100.8(40.83), 15.2(2.6.25)EA, 8.3(2.43), 9.0(4.22), 9.1(5.13)
Bug Id:
CSCur59704
Title:
ASA: Traceback in idfw_proc
Description:

Symptom:
ASA traceback on Thread name: idfw_proc

Conditions:
The issue is related to usage of FQDN objects along with 'object-group-search access-control' feature.

Workaround:
Disable 'object-group-search access-control' or do not use FQDN objects.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.0(4)
Known Fixed Releases:
100.11(0.54), 100.12(0.104), 100.13(0.12), 100.13(1.15), 100.13(16.23), 100.13(19.6), 100.13(20.3), 100.13(21.3), 100.13(23.1), 100.7(6.137)
Bug Id:
CSCur68857
Title:
Linux Kernel ioctx_alloc Local Denial of Service Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2013-7348

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 2.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:TF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2013-7348 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCtt96550
Title:
x-late Pairing Denial of Service Vulnerability
Description:

Symptom:
A vulnerability exists in the xlate code of the Cisco ASA that may allow an unauthenticated remote attacker to trigger the reload of the affected
system.
The vulnerability is due to a improper deletion of one xlate while still active pairing. The attacker should be able to exploit this race
condition in order to trigger this vulnerability.


Conditions:
This race condition may be triggered by the following inspection engines:
H323, skinny, sip, rtsp

Workaround:
if possible disable the above inspections
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.4/4.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2012-5412 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
22-JUN-2015
Known Affected Releases:
8.2(4.4), 8.2(5.15), 8.4(2)
Known Fixed Releases:
100.7(13.46), 100.7(14.41), 100.7(17.11), 100.7(18.4), 100.7(6.54), 100.7(8.34), 100.8(0.44), 100.8(0.49), 100.8(0.51), 100.8(0.52)
Bug Id:
CSCuu55785
Title:
ASA ISE And Hostscan are not supported together
Description:

Symptom:
When using pre-login checks with Hostscan and NAC agent for post login, an incorrect DAP is pushed after the CoA reauthentication is sent.

This is because ISE and Hostscan are not supported together on the same connection. This is a documentation bug meant to clarify this design limitation in the deployment guides.

Conditions:
ASA configured with CoA for posture.
ASA Hostscan pre-login check attributes used in DAP Policies. NAC agent used for post-login compliance

Workaround:
Remove Hostscan attributes in the DAP check

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.2(1), 9.2(2), 9.3(1)
Known Fixed Releases:
Bug Id:
CSCuu60257
Title:
Unicorn Proxy Thread crash when customized webvpn welcome page accessed
Description:

Symptom:
ASA presenting crashes caused by "Unicorn Proxy Thread" whenever the customized welcome Webvpn portal is loaded.

Conditions:
> ASA running code 9.4.1
> Webvpn welcome page customized with main logo changed.

Workaround:
Remove the webvpn customization settings from the unit (being tested).

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.4(1)
Known Fixed Releases:
Bug Id:
CSCur68876
Title:
Linux Kernel Futex Subsystem Local Privilege Escalation Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-0205

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 6.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-0205 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1), 99.1
Known Fixed Releases:
Bug Id:
CSCtr54561
Title:
ASA 8.4.2 traceback on Dispatch Unit
Description:

Symptom:
ASA traceback on Dispatch Unit

Conditions:
ASA running 8.4.2

Workaround:
No known workaround

Status:
Other
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
8.4(2)
Known Fixed Releases:
Bug Id:
CSCut92194
Title:
ASA crash in Thread Name: CP Processing
Description:

Symptom:
ASA running version 9.3.2 is crashing intermittently on Thread Name: CP Processing.

Conditions:
ASA is configured for Websense url filtering.

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.19), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.10)
Bug Id:
CSCtz70573
Title:
SMP ASA traceback on periodic_handler for inspecting icmp or dns trafic
Description:

Symptom:
ASA may reload with traceback in Thread Name: DATAPATH-20-2333.

Conditions:

ASA running 8.x on multi-core platforms.

Workaround:
Disable ICMP and DNS inspection.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
100.7(6.103), 8.4(1), 8.4(3), 8.4(4), 8.4(5), 8.5(1.9), 9.1(1)
Known Fixed Releases:
100.10(0.32), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.7(13.110), 100.7(6.106), 100.7(6.125), 100.8(27.31), 100.8(38.4), 100.8(38.59)
Bug Id:
CSCut27332
Title:
ASA traceback in aaa_shim_thread
Description:

Symptom:
ASA traceback in aaa_shim_thread

Conditions:
ASA running 9.3.2
High load with AnyConnect 3.0 or newer
Heavy DAP or dynamic ACL usage with large aggregate ACLs
Failover configuration

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.3(2), 9.3(3), 9.4(1)
Known Fixed Releases:
100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.16), 100.14(26.6), 100.14(3.5)
Bug Id:
CSCur68846
Title:
Linux Kernel wanxl.c Information Disclosure Vulnerability
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-1445

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 1.7:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:P/I:N/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-1445 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.200), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCtn40707
Title:
assert traceback for ifc cfg removal with same-security intra-interface
Description:

Symptom:

Tracebacks seen on standby ASA in thread name: fover_parse when write standby was issued

Conditions:

Active/Standby failover.

This crash will be hit if there are any flows with egress and ingress interface based on same interface (i.e. same-security intra-interface
configured) and clear config interface was issued on that ifc either directly or through config replication...
Write standby was issued on active firewall when standby crashed.

Workaround:

none at this time
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
100.8(0.60), 100.8(2.22), 8.2(5.5), 8.3(1.6), 8.4(2)
Known Fixed Releases:
100.7(13.59), 100.7(18.11), 100.7(19.9), 100.7(20.2), 100.7(6.64), 100.8(0.68), 100.8(11.11), 100.8(14.10), 100.8(24.36), 100.8(32.5)
Bug Id:
CSCuu48626
Title:
ASA - access list address argument changed from host 0.0.0.0 to host ::
Description:

Symptom:
ASA changes the configured access-list address argument from "host 0.0.0.0" to "host ::"

Conditions:
ASA version 9.3.2 and 9.3.3

Workaround:
The check can be bypassed by using an object in the ACL:
1. Create a network object for host 0/0
object network HOST-0
host 0.0.0.0
2. Use this network-object in an extended access-list:
access-list NAME extended permit ip object HOST-0 any

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
9.3(2), 9.3(3)
Known Fixed Releases:
100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.37), 100.15(0.13), 100.15(1.15), 100.15(2.47)
Bug Id:
CSCur55125
Title:
cURL and libcurl GSSAPI Authentication Mechanism Unsafe Authentication
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-2192

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.3:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-2192 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
8.7(1), 9.2(1), 99.1
Known Fixed Releases:
Bug Id:
CSCut45659
Title:
ASA: Intermittent failure in assigning IP address to AnyConnect client
Description:

Symptom:
After upgrade to 9.1.5 or later releases, the ASA may fail to assign an IP address to the AnyConnect client intermittently. This will result in a VPN connection failure and the user will be displayed the following message 'AnyConnect was not able to establish a connection to the specified secure gateway. Please try connecting again'

Conditions:
1. ASA running 9.1.5 or later release
2. IP address assigned either via local pool or external DHCP server

Workaround:
Reboot of the ASA appears to resolve the issue

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
9.1(5), 9.1(5.21)
Known Fixed Releases:
Bug Id:
CSCuf52468
Title:
ASA Digital Certificate Authentication Bypass Vulnerability
Description:

Summary

Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability
SQL*Net Inspection Engine Denial of Service Vulnerability
Digital Certificate Authentication Bypass Vulnerability
Remote Access VPN Authentication Bypass Vulnerability
Digital Certificate HTTP Authentication Bypass Vulnerability
HTTP Deep Packet Inspection Denial of Service Vulnerability
DNS Inspection Denial of Service Vulnerability
AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability
Clientless SSL VPN Denial of Service Vulnerability


These vulnerabilities are independent of one other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability, SQL*Net Inspection Engine Denial of Service
Vulnerability, HTTP Deep Packet Inspection Denial of Service Vulnerability, DNS Inspection Denial of Service Vulnerability and Clientless SSL VPN
Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Digital Certificate Authentication Bypass Vulnerability, Remote Access VPN Authentication Bypass Vulnerability,
and Digital Certificate HTTP Authentication Bypass Vulnerability may result in an authentication bypass, which could allow the attacker access to
the inside network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Successful exploitation of the AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability may exhaust available memory, which could
result in general system instability and cause the affected system to become unresponsive and stop forwarding traffic.

Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of the vulnerabilities. This
advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa

Note: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers may be affected by the
SQL*Net Inspection Engine Denial of Service Vulnerability. A separate Cisco Security Advisory has been published to disclose the vulnerabilities
that affect the Cisco FWSM. This advisory is available at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-fwsm


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 10/8.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2013-5509 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
23-JUN-2015
Known Affected Releases:
9.0(1), 9.1(1)
Known Fixed Releases:
100.8(27.83), 100.8(40.2), 100.8(60.7), 100.9(0.38), 100.9(4.5), 100.9(6.16), 100.9(7.20), 9.0(2.100), 9.0(2.5), 9.0(3)
Bug Id:
CSCtw68156
Title:
Memory leak by chunk_create_internal
Description:

Symptom:
Free memory keeps decreasing over time.

Conditions:
This has been seen on ASA running 8.2.4

Workaround:
Reload the ASA before free memory gets too close to 0%

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
8.2(4)
Known Fixed Releases:
Bug Id:
CSCus30833
Title:
ASA: Page fault traceback in SXP CORE thread
Description:

Symptom:
An ASA configured for CTS may generate a traceback and reload. The traceback will contain the following strings:

Thread Name: SXP CORE
Page fault: Unknown

Conditions:
The ASA must be configured to receive and process SXP packets from one or more devices. For example:

cts sxp enable
cts sxp connection peer 192.168.110.100 password none mode peer speaker

Workaround:
There is no known workaround at this time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
100.11(0.55), 100.12(0.111), 100.13(0.15), 100.13(1.38), 100.13(19.9), 100.13(21.6), 100.13(23.5), 100.13(24.4), 100.8(40.94), 9.2(3.101)
Bug Id:
CSCua52914
Title:
1550 byte block depletion due to webvpn snp_fp_svc_ob_tunnel_flow
Description:

<B>Symptom:</B>
An ASA firewall may run out of 1550 byte blocks and as a result, cease to pass traffic.
Management to/from the box may also be affected. The depletion can be seen in the output of
'show blocks' with a focus on the 1550 byte blocks.

<B>Conditions:</B>
This has been seen on ASA code version 8.6.1 and may exist on other versions as well. Initial
debugging seems to implicate some webvpn functionality as the root cause, so having webvpn
traffic appears to be a requirement.

<B>Workaround:</B>
At this point, the only option is to reload the ASA to restore the lost memory blocks.

Status:
Other
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
8.6(1)
Known Fixed Releases:
Bug Id:
CSCuq65542
Title:
Cisco ASA Software Version Information Disclosure Vulnerability
Description:

Symptoms:
A vulnerability in the SSL VPN code of Cisco ASA Software could allow an
unauthenticated, remote attacker to obtain information about the Cisco
ASA Software version. This information could be used for reconnaisance
attacks..

The vulnerability is due to a verbose output returned when a specific
URL is submitted to the affected system.. An attacker could exploit this
vulnerability by browsing a specific URL. SSL VPN feature needs to be
enabled for a system to be vulnerable .

This vulnerability was reported to Cisco by Alec STUART-MUIRK

Conditions:
SSL VPN needs to be configued on the system.

Workaround:

none


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C
CVE ID CVE-2014-3398 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3398

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
9.1(5.3)
Known Fixed Releases:
100.11(0.46), 100.12(0.43), 100.12(10.47), 100.12(6.5), 100.13(0.2), 100.13(11.1), 100.13(12.1), 100.13(13.1), 100.13(14.1), 100.13(15.1)
Bug Id:
CSCuh19234
Title:
Traceback after upgrade from pre-8.3 to 8.4(6), 9.1(2) or 9.0(3)
Description:

Symptom:
Crash happens during upgrade migration from pre-8.3 to 8.4(6), 9.1(2) or 9.0(3). Causing bootloop.

Conditions:
ASA with version pre-8.3

Workaround:
Manual migration of the config

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
23-JUN-2015
Known Affected Releases:
8.4(6), 9.0(3), 9.1(2)
Known Fixed Releases:
100.10(0.6), 100.7(6.119), 100.8(27.84), 100.8(38.19), 100.8(40.8), 100.8(41.2), 100.8(60.21), 100.9(0.51), 100.9(10.1), 100.9(6.28)
Bug Id:
CSCuq72664
Title:
ASA - 80 Byte memory block depletion
Description:

Symptom:
ASA block 80 gets depleted causing outage to Anyconnect and affecting SSH sessions to the box

Other symptoms
1) show block shows 80 byte blocks being at 0
2) syslogs generated: %ASA-3-321007: System is low on free memory blocks of size 80 (0 CNT out of 2500 MAX)

Conditions:

Workaround:
Use anyconnect ssl compression none
ASA(config)# group-policy DfltGrpPolicy attributes
ASA(config-group-policy)# webvpn
ASA(config-group-webvpn)# anyconnect ssl compression none

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
9.2(2.4), 9.3(1)
Known Fixed Releases:
100.11(0.46), 100.12(0.46), 100.12(10.47), 100.12(6.7), 100.13(0.2), 100.13(11.1), 100.13(12.1), 100.13(13.1), 100.13(14.1), 100.13(15.1)
Bug Id:
CSCtx43501
Title:
CPU hog due to snmp polling of ASA memory pool information
Description:

Symptom:
The ASA provides access to three different memory pools via SNMP.
1) The "System memory" pool (which is a superset of 2 and 3 below)
2) The MEMPOOL_DMA pool
3) The MEMPOOL_GLOBAL_SHARED pool

If the MEMPOOL_GLOBAL_SHARED pool information is queried via SNMP, a CPU hog might occur. The ASA's CPU may be held by the SNMP process for too long before yielding the CPU to other processes. If the data rate is high enough through the ASA, packets might be dropped.

If an ASA is experiencing this problem, it could generate syslogs that look like this:
%ASA-4-711004: Task ran for 374 msec, Process = snmp, PC = 12229dc, Call stack = 0x00000000012229dc 0x000000000122175c 0x000000000121e45a
0x0000000001221247 0x00000000011fba3a 0x00000000011fa1ca
0x00000000004245a5

Also, the output of 'show process cpu-hog' will show entries for SNMP:

Process: snmp, PROC_PC_TOTAL: 9443, MAXHOG: 13, LASTHOG: 12
LASTHOG At: 12:47:00 CST Jan 23 2012
PC: 8c45b98 (suspend)

Process: snmp, NUMHOG: 9443, MAXHOG: 13, LASTHOG: 12
LASTHOG At: 12:47:00 CST Jan 23 2012
PC: 8c45b98 (suspend)
Call stack: 8b6aac3 8b4ae5d 8b49bbc 8063b33

Conditions:
To encounter this problem, memory information for the "Global Shared" pool must be queried via SNMP.

Workaround:
Avoid polling the memory information for the Global Shared pool:

Exclude:
.1.3.6.1.4.1.9.9.48.1.1.1.X.7 - "MEMPOOL_GLOBAL_SHARED"

where X is the integer corresponding to a particular statistic about the pool.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:U/RC:C
CVE ID CVE-2012-4664 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Terminated
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
8.1(2.23), 8.2(3.6), 8.4(2.8), 8.4(3.8), 8.4(4), 9.1(2)
Known Fixed Releases:
Bug Id:
CSCud05798
Title:
FIPS Self-Test failure,fips_continuous_rng_test [-1:8:0:4:4]
Description:

Symptom:

ASA running 8.3.2 reloaded due to the FIPS system detecting a failure. The Specific failure was due to a check of the Random Number Generator. This is not a crash, but a purposefully forced reload by the FIPS system.

The console may show:

*** --- START GRACEFUL SHUTDOWN ---
***
*** Message to all terminals:
***
***
ERROR: FIPS Self-Test failure, fips_continuous_rng_test [-1:8:0:4:4]
Shutting down isakmp
Shutting down webvpn
Shutting down File system

Conditions:
This occurs when FIPS is enabled on the firewall and an anomaly is detected with the random number generator.

Workaround:
Unknown at this time.

Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
8.3(2)
Known Fixed Releases:
100.10(0.6), 100.7(6.117), 100.7(6.118), 100.8(27.83), 100.8(38.15), 100.8(38.16), 100.8(40.4), 100.8(41.2), 100.8(60.10), 100.8(60.7)
Bug Id:
CSCuq20232
Title:
ASA 8.2.5 CPU hog in accept/http
Description:

Symptom:
ASDM access failure as there are hanged sessions

ASDM is not able to access asdm_handler service on device It is likely the user password has expired or the maximum number of sessions has ben exceeded on the device

Conditions:
NA

Workaround:
NA

Further Problem Description:
ASDM access failure as there are hanged sessions

ASDM is not able to access asdm_handler service on device It is likely the user password has expired or the maximum number of sessions has ben exceeded on the device

Status:
Terminated
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
8.2(5)
Known Fixed Releases:
Bug Id:
CSCut46019
Title:
MARCH 2015 OpenSSL Vulnerabilities
Description:


Symptom:

This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-0286, CVE-2015-0292, CVE-2015-0293, CVE-2015-0209, CVE-2015-0288

This bug has been opened to address the potential impact on this product.


Conditions:

Exposure is not configuration dependent.

First Fixed Information:

8.2.5.58 (April 2015)
8.3.2.45 (April 2015)
8.4.7.29 (April 2015)
8.5.1.25 (April 2015)
8.6.1.18 (April 2015)
8.7.1.17 (April 2015)
9.0.4.34 (April 2015)
9.1.6.2 (24-Apr-2015)
9.2.3.5 (April 2015)
9.3.3.1 (8-May-2015)
9.4.1.1 (8-May-2015)

Published advisory is at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150320-openssl

Workaround:

Not available.


More Info:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 7.1/6.9

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html



Status:
Fixed
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
8.2(5), 9.2(1), 9.3(2)
Known Fixed Releases:
100.11(0.58), 100.12(0.123), 100.13(0.73), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.28), 100.14(7.28), 100.15(0.10)
Bug Id:
CSCut65365
Title:
Threat Detection Statistics causes a high rate of CPU hogs on DATAPATH
Description:

Symptom:
An ASA Firewall may exhibit elevated CPU utilization under very low traffic rates. Inspecting the output of 'show process cpu-usage' shows that the majority (90% or higher) is used by a processes whose name includes DATAPATH.

In addition, looking at the ouptut of 'show process cpu-hog' shows that the DATAPATH process identified above is experiencing a high rate of very short CPU hogs. For example:

Process: DATAPATH-0-1749, NUMHOG: 22115786, MAXHOG: 113, LASTHOG: 16
LASTHOG At: 10:12:41 CDT Mar 31 2015
PC: 0x0000000000000000 (suspend)
Call stack: 0x00000000004381fa 0x000000000071c19d 0x000000000171061d
0x00000000017199bc 0x000000363b608201


Process: DATAPATH-0-1749, PROC_PC_TOTAL: 390365697, MAXHOG: 129, LASTHOG: 12
LASTHOG At: 10:12:42 CDT Mar 31 2015
PC: 0x0000000000000000 (suspend)

Conditions:
This is seen on later versions of ASA code, and it seems to be primarily affecting code trains from 9.3.x and onwards with Threat Detection Statistics configured:

threat-detection statistics

Consult the bug notes for fixed in build information.

Workaround:
In many instances, disabling threat detection statistics appears to resolve the high-cpu condition. This can be done by issuing the following command in global configuration:

no threat-detection statistics

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Other
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
Bug Id:
CSCuc80080
Title:
DNS Inspection Denial of Service Vulnerability
Description:

Symptom:
Cisco ASA Software is affected by the following vulnerabilities:

IKE Version 1 Denial of Service Vulnerability
Crafted URL Denial of Service Vulnerability
Denial of Service During Validation of Crafted Certificates
DNS Inspection Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities may result in a reload of an affected device, leading to a denial of service (DoS) condition.


Conditions:
See PSIRT Security Advisory.

Workaround
See PSIRT Security Advisory.

Further Problem Description:
See PSIRT Security Advisory.

PSIRT Evaluation:

Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of these vulnerabilities.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-asa

Note: The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers may be affected by some of
the vulnerabilities listed above. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the Cisco
FWSM. This advisory is available at

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-fwsm

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
9.0(1), 9.1(0.2)
Known Fixed Releases:
100.8(0.245), 100.8(11.45), 100.8(27.20), 100.8(34.1), 100.8(38.3), 100.8(39.2), 100.9(0.6), 9.0(1.100), 9.0(1.2), 9.0(2)
Bug Id:
CSCuu85497
Title:
ASA Webvpn traceback followed by an unexpected reload
Description:

Symptom:
ASA stops responding to ASDM/webvpn/anyconnect and users see a blank page when they connect [users start seeing a blank page ]. After a while the whole box crashes without generating a crashino .

Conditions:
The issue has been seen after an upgrade to 9.2.3.4

Workaround:
Reload the ASA .

Further Problem Description:
The issue starts with the users reporting that they are unable to use clientless or anyconnect vpn . And at the same time there is no ASDM access to the device . Later the customer notices that they lose the access to the ASA [including icmp and telnet] . We found later that this is because the ASA crashes without generating a crashinfo [a silent crash].

recorded crash events for webvpn :
ASA Crash Recovery Dump: Timestamp 2015-05-07 10:11:32
ASA Crash Recovery Dump: Timestamp 2015-05-07 10:11:34

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
9.2(3.4)
Known Fixed Releases:
Bug Id:
CSCuu28858
Title:
ASA sends PIM join to both upstream neighbors
Description:

Symptom:
ASA sends PIM join to multiple upstream neighbors when an equal cost route exists for upstream traffic

Conditions:
ASA configured with an equal cost route upstream

Workaround:
configure a static route
or
configure dynamic routing to force one route over the other.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
9.0(4)
Known Fixed Releases:
Bug Id:
CSCuf31658
Title:
Linux Kernel nfs_readdata_release() and nfs_writedata_release() Functi
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2011-4325

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.9:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2011-4325 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
1 Catastrophic
Last Modified:
24-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCur30351
Title:
CSC-SSM : Evaluation of SSLv3 POODLE vulnerability
Description:

Symptom:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-3566

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
For CSC web console, we suggest disabling SSLv3 and enabling TLS on browser or CSC web server (tomcat).

To disable the SSLv3, you need change the server.xml: (/opt/trend/isvw/common/Tomcat/conf/)

(1)remove the attribute
sslProtocol="TLS",

(2)add attribute
sslProtocols="TLSv1,TLSv1.1,TLSv1.2"
For example, it is like:
SSLEnabled="true" maxThreads="150" secure="true"
keystoreFile="/opt/trend/isvw/config/.keystore"
keystorePass="changeit" keystoreType="JKS"
clientAuth="false" sslProtocols="TLSv1,TLSv1.1,TLSv1.2"

Then restart the UI service. (/opt/trend/isvw/script/ISui restart)

Further Problem Description:
Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.0:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-3566 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Terminated
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
6.6, 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1), 9.3(2), 99.1
Known Fixed Releases:
Bug Id:
CSCud62661
Title:
STI Flash write failure corrupts large files
Description:

Symptom:

After copying a new ASA image file to flash, the ASA may fail to boot.

Conditions:

Monitor the ASA's console. The ASA gets stuck booting at "Loading disk0:/asa901-k8.bin..."

Workaround:

Boot from another image or from a tftp server, format the flash, and then re-copy the images to the flash.

1) Commands to boot to TFTP from Rommon mode:

address 192.168.2.1
interface Ethernet0/2
server 192.168.2.100
file asa901-k8.bin
tftp

2) Format flash, copy the ASA and ASDM images.

format disk0:
copy tftp disk0:

3) Verify the image was copied correctly by checking the md5 checksum against what is listed on cisco.com.

verify disk0:/asa901-k8.bin

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
8.4, 9.0(1), 9.1(1)
Known Fixed Releases:
100.7(6.112), 100.8(27.63), 100.8(60.3), 100.9(0.37), 100.9(4.5), 100.9(6.12), 100.9(7.19), 8.4(5.8), 8.4(5.99), 8.4(6)
Bug Id:
CSCur07061
Title:
Traceback on standby ASA during hitless upgrade
Description:

Regression caused by a fix in CSCuq37448

Symptom:ASA system traceback was observed in data path.

Conditions:Cisco ASA running release 9.1.5.16.
Workaround:NA

More Info:This issue was seen in one case when doing system test with ASAv during hitless upgrade. In another the trace indicated it might be related to using the capture feature on an ASA-SM. However, the issue is not related to failover or packet capture.
In the bug fix of CSCuq37448, we added code for detecting and handling IPSec HA packets. That fix failed to handle certain corner cases and could subsequently cause a traceback. The fix removes the special handling.



Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
100.12(0.56), 100.13(11.7)
Known Fixed Releases:
100.11(0.50), 100.11(0.57), 100.12(0.118), 100.12(0.70), 100.12(6.20), 100.13(0.58), 100.13(0.6), 100.13(11.10), 100.13(12.16), 100.13(15.7)
Bug Id:
CSCul98420
Title:
'Route-Lookup' Behavior Assumed for Twice NAT with Identity Destination
Description:

Symptom:
Adaptive Security Appliance (ASA) or ASA Services Module implicitly perform a destination route lookup for Twice NAT entries with an identity destination translation even when the route-lookup keyword is not used.

Conditions:
Using an identity destination translation with Twice NAT such as this:

nat (inside,outside2) source dynamic 192_168_1_20 interface destination static ANY ANY service HTTP HTTP

and running a software image with the fix for CSCuf71119.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
8.4(6.4)
Known Fixed Releases:
100.10(9.5), 100.11(4.1), 100.7(6.129), 100.8(38.114), 100.8(40.60), 100.8(56.20), 100.8(62.2), 100.8(64.1), 100.8(65.3), 100.8(66.3)
Bug Id:
CSCuq29136
Title:
Cisco ASA SSL VPN Info Disclosure and DoS Vulnerability
Description:

Symptom:
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Denial of Service Vulnerability
Cisco ASA IKEv2 Denial of Service Vulnerability
Cisco ASA High Performance Monitor Denial of Service Vulnerability
Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability
Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability
Cisco ASA DNS Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Failover Command Injection Vulnerability
Cisco ASA VNMC Command Input Validation Vulnerability
Cisco ASA Local Path Inclusion Vulnerability
Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability
Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability
Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability

These vulnerabilities are independent of one another; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability, Cisco ASA VPN Denial of Service Vulnerability, Cisco ASA IKEv2 Denial of Service Vulnerability, Cisco ASA High Performance Monitor Denial of Service Vulnerability, Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability, Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability, and Cisco ASA DNS Inspection Engine Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Cisco ASA VPN Failover Command Injection Vulnerability, Cisco ASA VNMC Command Input Validation Vulnerability, and Cisco ASA Local Path Inclusion Vulnerability may result in full compromise of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability may result in the disclosure of internal information or, in some cases, a reload of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability may result in a compromise of the Clientless SSL VPN portal, which may lead to several types of attacks, which are not limited to cross-site scripting (XSS), stealing of credentials, or redirects of users to malicious web pages.

Successful exploitation of the Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability may result in a digital certificate validation bypass, which could allow the attacker to bypass digital certificate authentication and gain access inside the network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa

Conditions:
See published Cisco Security Advisory

Workaround:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS sscores as of the time of evaluation are 8.3/6.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:P/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2014-3392 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be fou

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
9.1(5.3)
Known Fixed Releases:
100.11(0.42), 100.12(0.31), 100.12(10.21), 100.12(15.8), 100.12(21.1), 100.12(6.2), 100.12(9.9), 100.7(6.134), 100.8(40.82), 8.2(5.51)
Bug Id:
CSCuj86222
Title:
ASA Drops OoO TCP Segments when Proxying Conns for ScanSafe Redirection
Description:

Symptom:
Users may experience significant and excessive performance degradation while redirecting HTTP/HTTPS traffic to CWS/ScanSafe when packet loss is incurred during transmission over the internet. This is especially noticeable for larger file downloads that are redirected through the towers.

Conditions:
1. User must be redirecting traffic through an ASA to Cisco Cloud Web Security towers
2. Packet loss is incurred on the connection while in transit across the internet which causes TCP segments to arrive out-of-order to the outside interface of the ASA

Workaround:
1. Identify cause of packet loss and correct the issue OR
2. Perform browser-based redirection to the CWS towers

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
9.1(1), 9.1(2), 9.1(3)
Known Fixed Releases:
Bug Id:
CSCuq50366
Title:
Traceback may occur on bring up of multiple SSL sessions w/DHE
Description:

Symptom:
On rare occasions it is possible that a traceback may occur when bringing up multiple SSL sessions with DHE.

Conditions:

Workaround:
Use a different cipher than DHE or upgrade to a version with the fix for this issue.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
100.12(10.28), 100.12(10.32), 100.12(2.14), 9.1(5.19), 9.1(5.21), 9.2(2.4)
Known Fixed Releases:
100.11(0.55), 100.12(10.33), 100.12(21.2), 100.12(9.14), 100.8(40.94), 9.1(5.101), 9.2(3.1), 9.3(2.1)
Bug Id:
CSCuq59114
Title:
ASA traceback in cluster with DATAPATH thread
Description:

Symptom:
ASA crashed with DATAPATH thread.

Conditions:
Seen in ASA5585 running 9.1(4)5 running in cluster.

Workaround:

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
9.1(4.5)
Known Fixed Releases:
100.11(0.55), 100.12(0.110), 100.13(0.15), 100.13(1.34), 100.13(16.31), 100.13(19.9), 100.13(20.5), 100.13(21.5), 100.13(23.3), 100.13(24.3)
Bug Id:
CSCuf31803
Title:
Linux Kernel nfs_wait_on_request() Local Denial of Service Vulnerabili
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2010-1087

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 4.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2010-1087 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1)
Known Fixed Releases:
Bug Id:
CSCui98316
Title:
ASA traceback in Thread Name: tmatch compile thread
Description:

Symptom:
ASA reloads unexpectedly with traceback in Thread Name: tmatch compile thread.

Conditions:
There is no known trigger.

Workaround:
There is no workaround at this time.

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
8.4(5.2)
Known Fixed Releases:
Bug Id:
CSCuq41510
Title:
Cisco ASA VNMC Input Validation Vulnerability
Description:

Symptom:
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Denial of Service Vulnerability
Cisco ASA IKEv2 Denial of Service Vulnerability
Cisco ASA High Performance Monitor Denial of Service Vulnerability
Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability
Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability
Cisco ASA DNS Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Failover Command Injection Vulnerability
Cisco ASA VNMC Command Input Validation Vulnerability
Cisco ASA Local Path Inclusion Vulnerability
Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability
Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability
Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability

These vulnerabilities are independent of one another; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability, Cisco ASA VPN Denial of Service Vulnerability, Cisco ASA IKEv2 Denial of Service Vulnerability, Cisco ASA High Performance Monitor Denial of Service Vulnerability, Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability, Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability, and Cisco ASA DNS Inspection Engine Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Cisco ASA VPN Failover Command Injection Vulnerability, Cisco ASA VNMC Command Input Validation Vulnerability, and Cisco ASA Local Path Inclusion Vulnerability may result in full compromise of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability may result in the disclosure of internal information or, in some cases, a reload of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability may result in a compromise of the Clientless SSL VPN portal, which may lead to several types of attacks, which are not limited to cross-site scripting (XSS), stealing of credentials, or redirects of users to malicious web pages.

Successful exploitation of the Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability may result in a digital certificate validation bypass, which could allow the attacker to bypass digital certificate authentication and gain access inside the network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa

Conditions:
See published Cisco Security Advisory

Workaround:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS sscores as of the time of evaluation are 6.5/6.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:M/C:C/I:C/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2014-3390 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be fou

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
24-JUN-2015
Known Affected Releases:
9.2(1)
Known Fixed Releases:
100.11(0.44), 100.12(0.38), 100.12(10.37), 100.12(15.10), 100.12(21.3), 100.12(6.4), 9.2(2.7), 9.3(1.1), 9.3(1.99), 9.3(2)
Bug Id:
CSCut40270
Title:
ASA: Traceback in Thread Name DATAPATH
Description:

Symptom:
ASA can unexpectedly reload and generate a traceback in Thread Name DATAPATH

Conditions:
ASA running 9.2(3)3 software version

Workaround:
n/a

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
9.2(3.3)
Known Fixed Releases:
Bug Id:
CSCtq86859
Title:
Traceback in Thread Name: IP SLA Mon Event Processor
Description:

Symptom:
ASA reload. Traceback in Thread Name: IP SLA Mon Event Processor

Conditions:
IP SLA configured on ASA. Commonly used on ASA for route-tracking feature

Workaround:
Disable IP SLA feature on ASA.

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
8.3(2.4)
Known Fixed Releases:
100.7(13.31), 100.7(14.20), 100.7(18.2), 100.7(6.44), 100.7(8.34), 100.8(0.24), 100.8(10.34), 100.8(12.31), 100.8(15.5), 100.8(19.11)
Bug Id:
CSCub38407
Title:
Add text section to coredump
Description:

Symptoms:
CiscoFireSIGHT contains a stored XSS vulnerability

Conditions:
none

Workaround:
Additional mitigation at: http://www.cisco.com/c/en/us/support/docs/cmb/cisco-amb-20060922-understanding-xss.html

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:N/I:P/A:N/E:F/RL:U/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
24-JUN-2015
Known Affected Releases:
8.4
Known Fixed Releases:
100.10(0.76), 100.10(2.7), 100.10(6.1), 100.10(7.1), 100.10(9.1), 100.11(4.1), 100.7(6.129), 100.8(38.111), 100.8(40.59), 100.8(56.17)
Bug Id:
CSCup22532
Title:
Multiple Vulnerabilities in OpenSSL - June 2014
Description:

Symptom:
The following Cisco products

Cisco Adaptive Security Appliance (ASA) Software v8.0 and later, including:
8.0.2 - 8.0.5.39,
8.1.1 - 8.1.2.56,
8.2.1 - 8.2.5.49,
8.3.1 - 8.3.2.40,
8.4.1 - 8.4.7.20,
8.5.1 - 8.5.1.20,
8.6.1 - 8.6.1.13,
8.7.1 - 8.7.1.11,
9.0.1 - 9.0.4.13,
9.1.1 - 9.1.5.7, and
9.2.1

include a version of openssl that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-0195 - DTLS invalid fragment vulnerability
CVE-2014-0224 - SSL/TLS MITM vulnerability

This bug has been opened to address the potential impact on this product.

Cisco has analyzed the following vulnerabilities and concluded that the previously listed products are not impacted:

CVE-2010-5298 - SSL_MODE_RELEASE_BUFFERS session injection or denial of service
CVE-2014-0076 - Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
CVE-2014-0198 - SSL_MODE_RELEASE_BUFFERS NULL pointer dereference
CVE-2014-0221 - DTLS recursion flaw
CVE-2014-3470 - Anonymous ECDH denial of service

Conditions:
The Cisco Adaptive Security Appliance (ASA) running software v9.2.1 is vulnerable to CVE-2014-0195 - DTLS invalid fragment vulnerability when SSLVPN is enabled and configured to use DTLS. Previous ASA software releases are NOT affected by this vulnerability.

The Cisco Adaptive Security Appliance (ASA) running software v8.0 and later is vulnerable to CVE-2014-0224 - SSL/TLS MITM vulnerability when using the following configurations:

* When SSLVPN is enabled and configured to allow clientless VPN tunnels, OR
* When TLS-proxy is configured (either stand-alone or in conjunction with the phone proxy feature), OR
* When the ASA is configured to join an Active Directory domain using the 'kcd-server' command.

When the ASA is acting as a server (or listener) it is not vulnerable. However, since there are no tools available for testing when we are a client, we have to assume that we could be vulnerable. The ASA must be acting as a client, connecting to a server with the SSL vulnerability and the MITM attacker must be on the network between the ASA and the server.

Note that "WebVPN" and "SSLVPN" are synonymous.

Workaround:
CCVE-2014-0195: This vulnerability impacts only DTLS connectivity on 9.2.1 and later

1. Disable DTLS connectivity to the ASA by changing all of the WebVPN-enabled interfaces to include 'tls-only'.

asa(config)# webvpn
asa(config-webvpn)# enable outside tls-only
INFO: WebVPN is enabled on 'outside', DTLS is disabled on 'outside'.


CVE-2014-0224: This defect impacts SSL connectivity in certain circumstances.

1. Disable SSLVPN clientless connectivity by removing all 'vpn-tunnel-protocol' commands with 'ssl-clientless' from your group-policies.

asa(config)# group-policy my_policy attributes
asa(config-group-policy)# no vpn-tunnel-protocol ssl-clientless
asa(config-group-policy)# show run group-policy
group-policy my_policy internal
group-policy my_policy attributes
vpn-tunnel-protocol ssl-client

2. Disable TLS-proxy by removing any 'tls-proxy' commands and associated 'policy-map' commands. For instance, if you had an incoming and outgoing proxy, like:

tls-proxy my_proxy_out
server trust-point foreign_trust
client trust-point local_trust
client cipher-suite 3des-sha1 null-sha1 aes128-sha1 aes256-sha1 rc4-sha1
!
tls-proxy my_proxy_in
server trust-point local_trust
client trust-point foreign_trust
client ciphe

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
8.0, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2(1)
Known Fixed Releases:
100.11(0.18), 100.11(0.21), 100.11(5.25), 100.11(5.28), 100.11(6.1), 100.12(10.4), 100.12(12.1), 100.12(13.6), 100.12(15.2), 100.12(2.10)
Bug Id:
CSCtr38262
Title:
ASA traceback in Thread Name: logger_save with logging flash-bufferwrap
Description:

Symptom:
ASA unexpectedly reboots. After that a show crashinfo shows a traceback in Thread Name: logger_save

Conditions:
When "logging flash-bufferwrap" is configured". This is similar to what already reported in CSCtd29482.

Workaround:
Disable "logging flash-bufferwrap"

Status:
Other
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
8.3(2)
Known Fixed Releases:
Bug Id:
CSCuo26918
Title:
ASA traceback in Thread Name: IKE Receiver due to 'Address not mapped'
Description:

Symptom:
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Denial of Service Vulnerability
Cisco ASA IKEv2 Denial of Service Vulnerability
Cisco ASA High Performance Monitor Denial of Service Vulnerability
Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability
Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability
Cisco ASA DNS Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Failover Command Injection Vulnerability
Cisco ASA VNMC Command Input Validation Vulnerability
Cisco ASA Local Path Inclusion Vulnerability
Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability
Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability
Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability

These vulnerabilities are independent of one another; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability, Cisco ASA VPN Denial of Service Vulnerability, Cisco ASA IKEv2 Denial of Service Vulnerability, Cisco ASA High Performance Monitor Denial of Service Vulnerability, Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability, Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability, and Cisco ASA DNS Inspection Engine Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Cisco ASA VPN Failover Command Injection Vulnerability, Cisco ASA VNMC Command Input Validation Vulnerability, and Cisco ASA Local Path Inclusion Vulnerability may result in full compromise of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability may result in the disclosure of internal information or, in some cases, a reload of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability may result in a compromise of the Clientless SSL VPN portal, which may lead to several types of attacks, which are not limited to cross-site scripting (XSS), stealing of credentials, or redirects of users to malicious web pages.

Successful exploitation of the Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability may result in a digital certificate validation bypass, which could allow the attacker to bypass digital certificate authentication and gain access inside the network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa

Conditions:
See published Cisco Security Advisory

Workaround:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS sscores as of the time of evaluation are 7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2014-3383 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be fou

Status:
Other
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
9.1(5)
Known Fixed Releases:
Bug Id:
CSCuq47574
Title:
Cisco ASA VNMC Input Validation Vulnerability
Description:

Symptom:
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Denial of Service Vulnerability
Cisco ASA IKEv2 Denial of Service Vulnerability
Cisco ASA High Performance Monitor Denial of Service Vulnerability
Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability
Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability
Cisco ASA DNS Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Failover Command Injection Vulnerability
Cisco ASA VNMC Command Input Validation Vulnerability
Cisco ASA Local Path Inclusion Vulnerability
Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability
Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability
Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability

These vulnerabilities are independent of one another; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability, Cisco ASA VPN Denial of Service Vulnerability, Cisco ASA IKEv2 Denial of Service Vulnerability, Cisco ASA High Performance Monitor Denial of Service Vulnerability, Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability, Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability, and Cisco ASA DNS Inspection Engine Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Cisco ASA VPN Failover Command Injection Vulnerability, Cisco ASA VNMC Command Input Validation Vulnerability, and Cisco ASA Local Path Inclusion Vulnerability may result in full compromise of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability may result in the disclosure of internal information or, in some cases, a reload of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability may result in a compromise of the Clientless SSL VPN portal, which may lead to several types of attacks, which are not limited to cross-site scripting (XSS), stealing of credentials, or redirects of users to malicious web pages.

Successful exploitation of the Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability may result in a digital certificate validation bypass, which could allow the attacker to bypass digital certificate authentication and gain access inside the network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa

Conditions:
See published Cisco Security Advisory

Workaround:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS sscores as of the time of evaluation are 6.5/6.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:M/C:C/I:C/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2014-3390 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be fou

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
24-JUN-2015
Known Affected Releases:
8.7(1.12)
Known Fixed Releases:
8.7(1.14)
Bug Id:
CSCuu77680
Title:
ASA traceback in Thread: Uauth_Proxy, assert in "hash_table_simple.c"
Description:

Symptom:
ASA crash on thread name Uauth_Proxy

Conditions:
Running 9.1.6 and AuthProxy is enabled

Workaround:
There is no known workaround

Further Problem Description:
Enable corefile to collect more information.

Status:
Terminated
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
9.1(6)
Known Fixed Releases:
Bug Id:
CSCuu18989
Title:
ASA %ASA-3-201011: Connection limit exceeded when not hitting max limit
Description:

Symptom:
It was noticed that when the maximum number of simultaneous connection limit is set, ASA might drop the connection with the error message ' %ASA-3-201011: Connection limit exceeded' even when it is clearly not close to hitting the maximum limit specified.

Conditions:
ASA 5585 running 9.4(1) version code

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
9.4(1), 9.5(1)
Known Fixed Releases:
Bug Id:
CSCuv01177
Title:
ASA: traceback in IDFW AD agent
Description:

Symptom:
ASA5585 in failover pair may traceback in IDFW process.

Conditions:
ASA running IDFW features.

Workaround:
Disable IDFW.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
9.2(3)
Known Fixed Releases:
Bug Id:
CSCug33233
Title:
Cisco ASA Management Connections Denial of Service
Description:

Symptoms:
ASA becomes unresponsive to management connection. This includes management over SSH, Telnet and HTTP(S)

Conditions:
This is seen when management traffic is allowed on more then one interface (e.g. inside and outside) and on one of this interface, management
connection are allowed via VPN tunnel.

Workaround:
none

Further Problem Description:
A vulnerability in in the code of the function that is creating management flows of the Cisco ASA Software could allow an unauthenticated, remote
attacker to to cause the affected system to become unresponsive to management session requests over SSH, Telnet and HTTP(S).

The vulnerability is due to a memory leak when the management flow is created. An attacker could exploit this vulnerability by creating several
management session requests.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2013-6707 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6707

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
9.0(2), 9.1(1)
Known Fixed Releases:
100.10(0.9), 100.10(1.10), 100.8(27.89), 100.8(38.30), 100.8(40.20), 100.8(41.2), 100.8(60.37), 100.9(10.4), 100.9(6.35), 9.0(3.100)
Bug Id:
CSCug64098
Title:
ASA 9.1.1-7 traceback with Checkheaps thread
Description:

Symptom:
ASA would crash on anyconnect connection establishment

CHECKHEAPS HAS DETECTED A MEMORY CORRUPTION

Reason: Allocated buffer corrupted
core0: An internal error occurred. Specifically, a programming assertion was
violated.
assertion "0" failed: file "malloc.c", line 3063

Conditions:
Anyconnect connection establishment to the box

Workaround:
None.

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
9.1(1.7)
Known Fixed Releases:
100.10(0.6), 100.8(27.84), 100.8(38.20), 100.8(40.9), 100.8(41.2), 100.8(60.24), 100.9(0.52), 100.9(10.1), 100.9(6.28), 100.9(7.32)
Bug Id:
CSCuu77207
Title:
ASA - URL filter - crash on thread name uauth_urlb clean
Description:

Symptom:
ASAs running URL filtering (Websense) and traffic redirection to the SFr module may experience a crash on the thread name uauth_urlb clean process.

Conditions:
- Seen on 9.4.1 ASA code
- URL filtering configured and being used
- Higher amounts of traffic (500+ mbps)
- Traffic redirection to the SFr module

Workaround:
Possible temporary workarounds:

- Disable of the traffic redirection to SFr module
- Disable URL filtering (websense)

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
9.4(1)
Known Fixed Releases:
Bug Id:
CSCug51375
Title:
ASA SSL: Continues to accept SSLv3 during TLSv1 only mode
Description:

Symptom:ASA negotiates connections over SSLv3 in spite of it being configured to negotiate TLSv1.
ASA(config)# sh run ssl
ssl server-version tlsv1-only

Conditions:Cisco ASA running release 8.2 and later.

If the 'ssl server-version' or 'ssl client-version' value is modified after boot, the changes may not be applied properly. This could lead to the default of SSLv3 being enabled.

Workaround:There is no workaround.

More Info:Upgrade to one of the Known Fixed Release:
* 8.2.5.55 or later
* 8.4.7.26 or later
* 8.5.1.23 or later
* 8.6.1.16 or later
* 8.7.1.15 or later
* 9.0.4.26 or later
* 9.1.5.21 or later
* 9.2.3 or later
* 9.3.1.1 or later





Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
9.1(1.105)
Known Fixed Releases:
100.10(0.6), 100.11(0.52), 100.12(0.79), 100.12(23.2), 100.12(30.8), 100.12(6.23), 100.13(0.11), 100.13(1.2), 100.13(11.18), 100.13(12.41)
Bug Id:
CSCtn56501
Title:
ASA may generate crypto archive with IPSec Ring timeout crash type
Description:

Symptom:
Crashes seen on ASA crypto engine:

Syslog messages 402125-402127 indicating crypto chip crash and soft-reset, on multiple occasions, which leads to a situation where:

1. Packets that should be serviced by the crypto engine [SSH, IPSec] are dropped
2. Crypto Archive files are generated:
#show flash:/crypto_archive
1 590756 Oct 11 2012 19:06:28 crypto_archive/crypto_eng0_arch_1.bin
2 590756 Oct 11 2012 19:07:04 crypto_archive/crypto_eng0_arch_2.bin
3. Syslog such as:

ASA-4-402125 CRYPTO: The ASA hardware accelerator Ipsec ring timed out (Desc= 0xC83DC7D8, CtrlStat= 0xB000, ResultP= 0xC5AEE8B0, ResultVal= 11, Cmd= 0x30, CmdSize= 0, Param= 0x0, Dlen=232, DataP= 0xC5AEE7D4, CtxtP= 0xC635A570, SWReset= 7)

ASA-4-402126 CRYPTO: The ASA created Crypto Archive File < disk0:/crypto_archive/crypto_eng0_arch_1.bin > as a Soft Reset was necessary. Please forward this archived information to Cisco.

Conditions:
ASA with Crypto Services enabled [IPSec, SSH]

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
8.2, 8.2(5)
Known Fixed Releases:
100.7(13.43), 100.7(14.36), 100.7(17.7), 100.7(18.4), 100.7(6.51), 100.8(0.40), 100.8(11.4), 100.8(15.17), 100.8(19.35), 100.8(2.30)
Bug Id:
CSCuu91304
Title:
Immediate FIN from client after GET breaks scansafe connection
Description:

Symptom:
Connections through the ASA to a scansafe tower may fail if the client sends a FIN packet immediately following a GET packet. This hangs the TCP connection and causes the transaction to fail.

Conditions:
This is seen if the CLIENT sends a TCP FIN packet before any data comes back from the TOWER.

Workaround:
None at this time

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
9.1(5.21)
Known Fixed Releases:
Bug Id:
CSCtz98516
Title:
Observed Traceback in SNMP while querying GET BULK for 'xlate count'
Description:

Symptom:
An ASA firewall may crash when being polled by SNMP in rare circumstances.

Conditions:
This has been seen primarily in the 8.4.x ASA code train. The first fix is in ASA interim code 8.4.4.2. To
trigger the bug, the ASA must be queried via SMP for GETBULK of the xlate OID:

1.3.6.1.4.1.9.10.77.1.2.1

Workaround:
Stop polling the ASA firewall via SNMP until an upgrade to the fixed code can be performed or modify the
OID's being polled by your SNMP monitor station to not include the affected OIDs.

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
100.7(22.1)
Known Fixed Releases:
100.11(0.57), 100.12(0.118), 100.13(0.58), 100.13(28.2), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13), 100.14(26.5)
Bug Id:
CSCur23709
Title:
ASA : evaluation of SSLv3 POODLE vulnerability
Description:

Symptom:
The Cisco ASA (Adaptive Security Appliance) includes a version of OpenSSL that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-3566

Conditions:
The default SSL configuration on all ASA software trains enables SSLv3. Due to bug CSCug51375, the ASA is unable to disable SSLv3 on most ASA versions.

To see the SSL configuration:

show run all ssl

Default configuration of the ASA:

ssl client-version any
ssl server-version any

The following non-default configuration values also enable SSLv3:

ssl client-version sslv3-only
ssl client-version sslv3
ssl server-version sslv3-only
ssl server-version sslv3

Some of the previously listed options are not available on older ASA software releases.

Workaround:
There are no workarounds.

Further Problem Description:
This bug is for SSL server-side and is fixed in the following (and later) posted ASA releases:

9.3.1.1
9.2.3
9.1.5.21
9.0.4.26
8.4.7.26
8.2.5.55

It will also be available in the April/2015 timeframe on the following ASA software releases:

8.3.2.43
8.5.1.23
8.6.1.16
8.7.1.15

For the client-side (Clientless Smart Tunnel Component), please check CSCur42776.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 2.6/2.5

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
8.2(1), 8.3(1), 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.0(1), 9.1(1), 99.1
Known Fixed Releases:
100.11(0.52), 100.12(0.79), 100.12(23.2), 100.12(30.8), 100.12(6.23), 100.13(0.11), 100.13(1.2), 100.13(1.3), 100.13(11.18), 100.13(11.23)
Bug Id:
CSCuj88114
Title:
WebVPN Java rewriter issue: Java Plugins fail after upgrade to Java 7u45
Description:

Symptom:
ASA WebVPN Java Plugins fail to load after upgrade to Java 7 Update 45 with the following General Exception error - 'com.sun.deploy.net.JARSigningException: Found unsigned entry in resource: https:///+CSCO+xxxxxxxxxxxxxxxxxxxxxxx++/vnc/VncViewer.jar'

Conditions:
Windows or Mac OSX machines using Java 7 Update 45. Also affects JRE build 1.6.0.51 and 65.

Workaround:
1) Disable the option 'Keep temporary files on my computer' on the Java Control Panel -> General -> Settings. This works for both Mac OSX and Windows.

2) Downgrade Java to version 7 Update 40 or below.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
8.4, 8.4(2), 8.4(5), 9.1, 9.1(2), 9.1(3)
Known Fixed Releases:
100.10(0.38), 100.10(1.21), 100.10(2.3), 100.10(3.1), 100.10(9.1), 100.7(6.125), 100.8(38.63), 100.8(40.41), 100.8(45.8), 100.8(46.28)
Bug Id:
CSCut49111
Title:
ASA traceback because of TD tcp-intercept feature
Description:

Symptom:
Multiple crash has been observed on ASA with threat-detection statistics tcp-intercept enabled

Conditions:
When threat-detection statistics tcp-intercept is enabled

Workaround:
Disabling TD for tcp intercept statistics stops crash.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
9.3(1)
Known Fixed Releases:
100.11(0.58), 100.12(0.125), 100.13(0.73), 100.13(21.13), 100.14(0.12), 100.14(10.17), 100.14(5.15), 100.14(6.27), 100.14(7.26), 100.15(0.10)
Bug Id:
CSCus08101
Title:
ASA: evaluation of Poodle Bites in TLSv1
Description:


Symptom:

Cisco ASA includes a version of TLS that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-8730

This vulnerability is hardware dependent.
ANY Cisco ASA Software releases running for Cisco ASAv and Cisco ASA1000v ARE NOT affected by this vulnerability.
ALL Cisco ASA Software releases running on Cisco ASA 5500 and 5500-X Series and Cisco ASA Service Module ARE affected by this issue.

The first fixed ASA software releases for this vulnerability are as follows
8.2 Train: 8.2.5.55
8.4 Train: 8.4.7.26
9.0 Train: 9.0.4.29
9.1 Train: 9.1.6
9.2 Train: 9.2.3.3
9.3 Train: 9.3.2.2


Conditions:

The Cisco ASA Software is affected by this vulnerability if a feature which use TLS is enabled. The exposure will be confined to that feature only.
Examples of feature using TLS are, HTTP Secure server for Management, Clientless and AnyConnect SSL VPN, TLS Proxy, Phone Proxy etc...


Workaround:

There is no workaround that mitigates this issue


More Info:

Additional details about the vulnerability listed above can be found at http://cve.mitre.org/cve/cve.html

Cisco has published the following Security Notice and IntelliShield Alert:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8730
http://tools.cisco.com/security/center/viewAlert.x?alertId=36740

The Sourcefire Snort SIDs for this vulnerability is: 32758

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/4.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C
CVE ID CVE-2014-8730 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8730

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html



Status:
Fixed
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
7.2, 8.0, 8.1, 8.2, 8.3, 8.4, 8.5, 9.0, 9.1, 9.2
Known Fixed Releases:
100.11(0.55), 100.12(0.110), 100.13(0.15), 100.13(1.34), 100.13(1.37), 100.13(19.9), 100.13(20.5), 100.13(21.5), 100.13(23.3), 100.13(24.3)
Bug Id:
CSCui60514
Title:
ASA 5585 SSP-IPS 9.x Gig interfaces do not come up after module reset
Description:

Symptom:
ASA 5585 with IPS-SSP, after the module is reset and is is done booting, GigabitEthernet interfaces on the module are still showing as down/down in the ASA.

Conditions:
5585 with IPS SSP, running 9.x, only GigabitEthernet are affected.

Workaround:
-- Issue "no shutdown" under the interface
OR
-- Reload the the ASA.

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
26-JUN-2015
Known Affected Releases:
9.0, 9.0(0.2), 9.1, 9.1(2)
Known Fixed Releases:
100.10(0.12), 100.10(1.10), 100.10(2.1), 100.7(6.131), 100.8(27.91), 100.8(38.32), 100.8(40.21), 100.8(41.2), 100.8(45.1), 100.8(46.1)
Bug Id:
CSCus06652
Title:
ASA5580-20 8.4.7.23: Traceback in Thread Name: ssh
Description:

Symptom:
Both Active and Standy ASA units traceback in Thread Name: ssh when adding an extended ACL

Conditions:
This was found on an Active/Standby pair of ASA5580-20 running v8.4(7)23

Workaround:
Make sure that a class configured to match for an ACL should have at least single element in it.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
8.4(7.23), 9.1(5.19)
Known Fixed Releases:
100.11(0.55), 100.12(0.111), 100.13(0.15), 100.13(1.35), 100.13(19.9), 100.13(20.5), 100.13(21.5), 100.13(23.4), 100.13(24.3), 100.7(6.138)
Bug Id:
CSCuu28909
Title:
ASA cluster: ICMP loop on CCL for ICMP packet destined to the VPN tunnel
Description:

Symptom:
In ASA cluster we may see a packet loop on the cluster control link. The loop is formed when we have ICMP error packet that should be going via a site to site VPN tunnel. Such packet may go into a loop and cause elevate CPU utilization on the ASA.

Conditions:
+ASA cluster
+site to site VPN tunnel configured
+ICMP error packets destined to the VPN tunnel

Workaround:
+deny icmp erros using an access-list on the data interfaces

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
9.1(6.1), 9.4(1)
Known Fixed Releases:
100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.17), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.9)
Bug Id:
CSCub94479
Title:
%ASA-3-210007: LU allocate xlate failed on Standby unit
Description:

Symptom:
ASA, running 8.4.3, produces "%ASA-3-210007: LU allocate xlate failed" error message on Standby unit even if the memory has enough free space.

Conditions:
unknown

Workaround:
Fixes: The root-cause of this bug is due to the issue in NAT rule order processing, require fixes for CSCtt11890 and CSCub59136, which are available from 8.4.5+ onwards. Recommend customer upgrade to the same.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
8.4(3)
Known Fixed Releases:
Bug Id:
CSCuu31751
Title:
ASA OSPF database not reflect changes
Description:

Symptom:
shut down interface from R3 did not reflect routing table on R#1 as ASA ospf database did not reflect changes. but routing table on ASA reflect properly. seeing same issue only in 9.2 or 9.3 but not in 9.1

R#1 <-ospf area 2--> ASA <--ospf area 0---> R#3

sh route ospf
O 10.20.20.0 255.255.255.0
[110/11] via 192.168.1.97, 00:32:33, backbone

ASA# sh ospf database 10.30.30.0
Summary Net Link States (Area 1)

Link ID ADV Router Age Seq# Checksum
10.30.30.0 1.1.1.1 1939 0x80000001 0xa245

Summary Net Link States (Area 2)

Link ID ADV Router Age Seq# Checksum
10.30.30.0 1.1.1.1 1939 0x80000001 0xa245

R1#sh ip route 10.30.30.0
Routing entry for 10.30.30.0/24
Known via "ospf 10", distance 110, metric 12, type inter area
Last update from 192.168.1.50 on GigabitEthernet0/0/0, 00:29:13 ago
Routing Descriptor Blocks:
* 192.168.1.50, from 1.1.1.1, 00:29:13 ago, via GigabitEthernet0/0/0
Route metric is 12, traffic share count is 1

Conditions:
Only seeing 9.2.x or 9.3.x (tested on 9.2(3), 9.2(3)4 and 9.3(3)) but it works fine on 9.1 (tested 9.1(5)21 and 9.1(6)1

Workaround:
clear ospf x process

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
108.2(0.7)
Known Fixed Releases:
100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.18), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.9)
Bug Id:
CSCur64659
Title:
ASA Traceback in Thread Name: DATAPATH-6-2544
Description:

Symptom:
ASA Traceback in Thread Name: DATAPATH-6-2544

Conditions:
ASA 5585

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
8.4(7.23), 9.1(5.19)
Known Fixed Releases:
100.11(0.54), 100.12(0.98), 100.12(23.4), 100.12(24.3), 100.13(0.11), 100.13(1.5), 100.13(11.19), 100.13(12.41), 100.13(16.18), 100.13(18.7)
Bug Id:
CSCuu73716
Title:
Traceback in Thread CP Processing
Description:

Symptom:
ASA crashes in thread name CP processing .

Conditions:
ASA5585-SSP-60 running version 932-smp-k8.bin

Workaround:
None at this time.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
9.3(2)
Known Fixed Releases:
Bug Id:
CSCur40249
Title:
L2L Test w/ DFP, SFR and debug SFR results in ASA becoming unresponsive
Description:

Symptom:An ASA Firewall may exhibit elevated CPU utilization under very low traffic rates.

'show process cpu-usage non-zero' shows most of the CPU usage is in the datapath as shown here:
uut19-5512# show processes cpu-usage non-zero
PC Thread 5Sec 1Min 5Min Process
0x00000000019649eb 0x00007fffee11d560 0.0% 0.2% 0.3% ssh
- - 95.4% 34.9% 38.5% DATAPATH-0-1451

Also, 'cpu hog granular-detection 1000 1' and 'show process cpu-hog' contain output similar to this:

Process: DATAPATH-0-1451, PROC_PC_TOTAL: 52, MAXHOG: 9284, LASTHOG: 2584
LASTHOG At: 23:41:21 UTC Apr 6 2015
PC: 0x0000000000000000 (suspend)

Process: DATAPATH-0-1451, NUMHOG: 51, MAXHOG: 9284, LASTHOG: 2584
LASTHOG At: 23:41:21 UTC Apr 6 2015
PC: 0x0000000000000000 (suspend)
Call stack: 0x00000000004381fa 0x000000000071cc3d 0x000000000171170d
0x000000000171aaac 0x000000371c808201

Interrupt based hog entry #1
Hog #1, traceback #1, at: 23:40:28 UTC Apr 6 2015, hog 9 ms
PC: 0x000000371c47a9b4
Call stack:
Hog #1, traceback #2, at: 23:40:28 UTC Apr 6 2015, hog 19 ms
PC: 0x000000371c47a9b0
Call stack:

Note there is no Call stack in the "Interrupt based hog entry", and the PC is in the 0x0000003700000000 range.


Conditions:Threat-detection is enabled or memory delay-free-poisoner are enabled.

This issue affects 9.3.2.x code versions only. 9.3.3 contains the fix for this issue.

Workaround:Disable threat detection (it is enabled be default). This can be done by issuing the following commands in global configuration:
no threat-detection basic-threat
no threat-detection statistics

Also make sure the delayed-free-poisoner is not enabled (it is not enabled by default and should be enabled only under TAC supervision):
no memory delayed-free-poisoner enable

More Info:


Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
100.10(6.10), 100.12(0.77)
Known Fixed Releases:
100.12(0.104), 100.13(0.12), 100.13(1.19), 100.13(16.25), 100.13(19.7), 100.13(20.3), 100.13(21.3), 100.13(23.1), 9.3(2.99), 9.3(3)
Bug Id:
CSCuu78835
Title:
Webvpn rewrite issues for Confluence - by atlassian on latest v6.4.5
Description:

Symptom:
On the latest atlassian version of 6.4.5 for Confluence, we have following issues when using it over clientless SSL:

1. For a new "create content" page, only the title of the page can be added, the body of the page is not editable.
2. When trying to add a comment, the body of the comment is missing, so cannot add anything.

Conditions:
Using Atlassian version 6.4.5 for Confluence

Workaround:
Use the older versions of Atlassian

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
9.2(2), 9.3(2), 9.4(1)
Known Fixed Releases:
Bug Id:
CSCtu32847
Title:
ASA 8.4(2.1) high memory and traceback in aaa_shim_thread
Description:

Symptom:
ASA 5540 running version 8.4(2.1) experienced high memory utilization, which eventually crashed the ASA in thread aaa_shim_thread. There was a loss of anyconnect , ASDM, SSH sessions that accompanied the high memory utilization.
Conditions:
None
Workaround:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
100.8(0.100), 8.4(2.1), 8.4(3)
Known Fixed Releases:
100.7(13.70), 100.7(21.4), 100.7(6.74), 100.8(0.113), 100.8(11.17), 100.8(27.2), 100.8(33.2), 100.9(0.1), 100.9(2.1), 8.4(4.2)
Bug Id:
CSCuj54806
Title:
ICMP inspection closes TCP conns with "Flow closed by inspection"
Description:

Symptom:
This DDTS is a Duplicate of CSCui77398

Conditions:

Workaround:

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
8.4(7), 9.0(3.2)
Known Fixed Releases:
Bug Id:
CSCum80899
Title:
ASA: Watchdog traceback in Unicorn Admin Handler with TopN host stats
Description:

Symptom:
Under rare circumstances, an ASA may generate a traceback and reload in the Unicorn Admin Handler thread.

Conditions:
This issue occurs when using ASDM to view TopN host statistics on the ASA.

Workaround:
There is no known workaround at this time.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
8.4(4.1)
Known Fixed Releases:
100.10(0.87), 100.10(2.13), 100.10(6.16), 100.10(7.3), 100.11(0.6), 100.11(5.1), 100.7(6.130), 100.8(40.68), 100.8(56.48), 100.8(64.14)
Bug Id:
CSCuu10284
Title:
ASA Dataplane captures dont capture packets when using match/access-list
Description:

Symptom:
ASA Dataplane captures dont show any packet captured even though the condition matches the flow

Conditions:
ASA dataplane captures applied with a match or access-list command

Workaround:
use the dataplane captures without the match/access-list command

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
9.3(2), 9.4(1)
Known Fixed Releases:
100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.20), 100.14(10.23), 100.14(5.16), 100.14(7.32), 100.15(0.12), 100.15(1.10), 100.15(2.36)
Bug Id:
CSCuu84697
Title:
ASA Traceback in Thread Name ssh/client
Description:

Symptom:
ASA Traceback in Thread Name: ssh/client

Conditions:
N/A

Workaround:
No workaround

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
9.1(6), 9.1(6.1)
Known Fixed Releases:
Bug Id:
CSCuq10239
Title:
Windows 8 with new JRE, IE is not gaining access to smart tunnel
Description:

Symptom:
IE on windows 8 with java start is not gaining access to smart tunnel

Conditions:
user is starting smart tunnel with java, UAC is turned on

Workaround:
turn UAC off or use active-x to start smart tunnel

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
8.4(7)
Known Fixed Releases:
100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.24), 100.14(10.23), 100.14(5.17), 100.14(7.32), 100.15(0.13), 100.15(1.15)
Bug Id:
CSCsl77134
Title:
Traceback in thread name Dispatch unit related to failover
Description:

Symptom:

When configured for failover and under unusual circumstances, the ASA may experience a crash in "Dispatch Unit" thread.

Conditions:

Failover is enabled.

Workaround:

This crash appears to only affect the active ASA in a failover pair. When the crash occurs, the standby ASA is able to take over and continue passing traffic.

Status:
Other
Severity:
2 Severe
Last Modified:
26-JUN-2015
Known Affected Releases:
8.0(2.19)
Known Fixed Releases:
Bug Id:
CSCua35666
Title:
ASA: traceback in Thread Name: IPsec message handler,Syslog 602305.
Description:

Symptom:
ASA running 8.4.4 reload in threadname IPsec message handler.

Conditions:
This crash is related to IPSEC VPN and new 8.4.4 syslog 602305.

Workaround:
Disable syslog message 602305.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
8.4(0.4), 8.4(4)
Known Fixed Releases:
100.7(6.84), 100.8(34.1), 8.4(4.2), 8.4(4.99), 8.4(5)
Bug Id:
CSCuv04732
Title:
5505 QoS priority not work w/ shaping
Description:

Symptom:
5505 QoS priority not work w/ shaping

Conditions:
5505 QoS configuration of shaping with priority queue

Workaround:
Use policing with priority

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
9.1(2), 9.1(3), 9.2(3.4)
Known Fixed Releases:
Bug Id:
CSCuu89777
Title:
ASA: Traceback in Thread Name: IP Thread
Description:

Symptom:
ASA device traceback with Thread Name:- IP Thread

Conditions:
Applying captures on the ASA device

Workaround:
Do not apply captures on the ASA device

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
9.2(3.4)
Known Fixed Releases:
Bug Id:
CSCuv05386
Title:
Clientless webvpn on ASA does not display asmx files
Description:

Symptom:
Clientless user selects bookmark from webportal. The page does not display correctly, there is a portion of the page that is garbled or is missing text

Conditions:
-Clientless user authenticates to the webportal, then selects bookmark that points to internal HTTP site.
-The user see's garbled or incomplete text returned from the ASA.

Workaround:
Smart Tunnel resolves the issue.
Using the stand alone AC client resolves the issue.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
9.1(6)
Known Fixed Releases:
Bug Id:
CSCud17993
Title:
ASA-Traceback in Dispatch unit due to dcerpc inspection
Description:

Symptom:
ASA Traceback in Dispatch unit due to DCERPC inspection.

Conditions:
upgrading the firewall from 8.4.3.9 to 8.4.4.5

Workaround:
Downgrade to version 8.4.3.9.

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
8.4(4.5), 8.4(4.9), 8.4(5)
Known Fixed Releases:
100.7(13.109), 100.7(6.105), 100.8(27.30), 100.8(38.4), 100.8(50.12), 100.9(0.20), 100.9(4.1), 100.9(9.1), 8.4(5.5), 8.4(5.99)
Bug Id:
CSCuq09709
Title:
Using ASA 9.2.1, Anyconnect weblaunch fails with URL-list in DAP
Description:

Symptom:
When attempting to connect to the ASA using web launch user receives the error:

"The VPN configuration received from the secure gateway is invalid."

Conditions:
When launching Anyconnect through the web portal, with a DAP policy assigned which does not contain a user-message

Workaround:
Use the desktop client to connect

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
27-JUN-2015
Known Affected Releases:
9.2(1)
Known Fixed Releases:
100.11(0.41), 100.12(0.29), 100.12(10.17), 100.12(15.7), 100.12(21.1), 100.12(6.1), 100.12(9.9), 9.2(2.5), 9.3(1.99), 9.3(2)
Bug Id:
CSCsy71401
Title:
Traceback when editing object-group
Description:

Symptom:

The ASA will crash if changes are made to an object group. The crash thread will be whatever process was used for connecting to the ASA (ssh, telnet, ci console, etc).

The crash dump will indicate that CPU and Memory were at 99% utilization.

Conditions:

Object groups must be used by the ASA in the ACL.

Workaround:

None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
7.2(4.17), 8.0(4)
Known Fixed Releases:
100.3(0.2), 100.4(0.2), 7.2(4.34), 8.0(4.33), 8.0(5), 8.1(2.24), 8.2(1.2), 8.2(4)
Bug Id:
CSCuh13899
Title:
ASA protocol inspection connection table fill up DOS Vulnerability
Description:

Symptom:
Some connection may not removed even after reaching idle timeout.

Conditions:
Non inspected flows and flows inspected in CP will be affected.
Flows which are inspected in DP such as icmp, icmp-error, simple-dns (udp), simple-http, ip-thru, waas, srtp, ip-options, ipv6 are not affected.

Workaround:
1. Clear the connection using the command ''clear conn''
2. disable specific protocol inspection where possible and open higher port ranges in the ACL.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2013-3463 has been assigned to document this issue.

Additional details about the vulnerability described here can be found at:
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3463

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
8.3(2), 8.4(5.7), 8.4(6), 9.0(2.3), 9.1(1.5), 9.1(2.1)
Known Fixed Releases:
100.10(0.6), 100.7(13.118), 100.7(6.121), 100.8(27.85), 100.8(38.28), 100.8(40.16), 100.8(41.2), 100.8(60.34), 100.9(10.4), 100.9(6.32)
Bug Id:
CSCur77736
Title:
ASA : 256 Byte Block Depletion with CoA enabled
Description:

Symptom:
ASA 256 Byte blocks gets depleted every few hours affecting failover , VPN, SSH and ASDM

Conditions:
CoA enabled on the ASA.

Workaround:
Disable CoA on the ASA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
9.2(2.8)
Known Fixed Releases:
100.11(0.54), 100.12(0.104), 100.13(0.12), 100.13(1.15), 100.13(16.23), 100.13(19.6), 100.13(20.3), 100.13(21.3), 100.13(23.1), 9.2(2.105)
Bug Id:
CSCuu88437
Title:
ASA5506-X:copy file operations fail with jumbo-frame-reservation config
Description:

Symptom:
Copy file operations fail with error when running these images (9.4.1.1, 9.4.1.2) on a ASA-5506-X, when the config is enabled for "jumbo-frame reservation". The error displayed is as below:

"Error writing disk0:/ (Cannot allocate memory)"

It doesn't matter what file you operate on , an asdm or an lfbff image , and whether you are copying ftp/tftp to disk0 or just simply copying a file on disk0://file to disk0://file1.
I used asdm-732.bin image for this operation:
"copy disk0:/asdm-732.bin disk0:/asdm1", which errors out with above error.

Conditions:
Copying file operations to disk0 on a ASA5506-X.

Workaround:
Remove the "jumbo-frame reservation" CLI config, reboot, and then copy operations succeed.Re-enable the CLI after copy operations are complete.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
28-JUN-2015
Known Affected Releases:
100.14(0.47)
Known Fixed Releases:
100.13(0.81), 100.14(0.48), 100.14(0.49), 100.15(1.22), 100.15(2.53), 99.1(2.177)
Bug Id:
CSCuu63656
Title:
ASA not generating PIM register packet for directly connected sources
Description:

Symptom:
Topology
------------
Sender ---> ASA(DR) ----> RP -----> Receiver

Running 9.2.1 or later on the ASA and the Sender is directly connected to the ASA (DR)
Sender is behind ASA
RP is in front of ASA
ASA not sending PIM Register packet to RP

Conditions:
running 9.2.1 or later

Workaround:
downgrade to code 9.1.5

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.2(1), 9.3(2), 9.4
Known Fixed Releases:
100.12(0.130), 100.13(0.80), 100.14(0.45), 100.14(5.21), 100.14(7.41), 100.15(0.16), 100.15(1.20), 100.15(2.54), 100.15(3.8), 100.15(4.12)
Bug Id:
CSCuu45812
Title:
asa Traceback with Thread Name idfw_proc
Description:

Symptom:
asa Traceback with Thread Name idfw_proc

Conditions:

Workaround:
no workaround available currently

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.1(6)
Known Fixed Releases:
100.12(0.128), 100.13(0.78), 100.13(21.16), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.54), 100.15(3.8)
Bug Id:
CSCus27650
Title:
TLS Proxy + Cut Through proxy not working correctly with TLS1.2
Description:

Symptom:
Cut Through Proxy and TLS Proxy may fail to function when using TLS1.2.

Conditions:

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
100.13(1.32), 9.3(2)
Known Fixed Releases:
100.12(0.130), 100.13(0.80), 100.14(0.43), 100.14(5.20), 100.14(7.40), 100.15(0.16), 100.15(1.20), 100.15(2.53), 100.15(3.8), 100.15(4.12)
Bug Id:
CSCur99653
Title:
Codenomicon HTTP-server suite may cause crash
Description:

Symptom:
Codenomicon HTTP-server suite may cause crash

Conditions:
Codenomicon server testing

Workaround:
none

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
100.12(0.108), 100.13(1.10), 9.3(1.113)
Known Fixed Releases:
Bug Id:
CSCuu27334
Title:
ASA: Traceback with Thread Name - AAA
Description:

Symptom:
ASA device Traceback with Thread Name:- AAA

Conditions:
ASA device running ASA 9.1(4) version

Workaround:
Upgrade to 9.1.6.4 or later.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.1(4)
Known Fixed Releases:
100.12(0.128), 100.13(0.78), 100.13(21.16), 100.14(0.33), 100.14(5.18), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.53), 100.15(3.8)
Bug Id:
CSCut71095
Title:
ASA WebVPN clientless cookie authentication bypass
Description:

Symptom:
In some instances, the ASA WebVPN clientless session ID is included the URL. Session ID's should only be stored in cookies and transmitted over
secure channels.

Conditions:
-- WebVPN

Workaround:
none

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.1, 9.4(1)
Known Fixed Releases:
100.12(0.130), 100.13(0.80), 100.14(0.44), 100.14(5.21), 100.14(7.41), 100.15(0.16), 100.15(1.20), 100.15(2.54), 100.15(3.8), 100.15(4.12)
Bug Id:
CSCuu56912
Title:
ASA change non-default port to 443 for https traffic redirected to CWS
Description:

Symptom:
ASA change non-default port to 443 for https traffic redirected to CWS

When user type in web browser url htts://X.X.X.X:YYYY debug scansafe generates
...
Complete Connect Method (513)
CONNECT X.X.X.X:443 HTTP/1.0
HOST: X.X.X.X:443
...

For traffic captured on outside interface towards CWS tower in 'Follow TCP Stream' statistic Wireshark display
CONNECT X.X.X.X:443 HTTP/1.0
HOST: X.X.X.X:443

Conditions:
ASA is configured to redirect non-default port for https traffic to CWS.

Workaround:
NONE

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.0, 9.1, 9.4
Known Fixed Releases:
100.12(0.129), 100.13(0.79), 100.14(0.39), 100.14(5.19), 100.15(0.15), 100.15(1.20), 100.15(2.53), 100.15(3.8), 100.15(4.12), 100.15(5.15)
Bug Id:
CSCuu36639
Title:
ASA 5506X: ESP Packet drop due to crypto accelerator ring timeout
Description:

Symptom:
Intermittently ESP packets are dropped on the ASA due to Crypto Accelerator issues.

Crypto Hardware accelerator on ASA crashes with the message
%ASA-4-402125: CRYPTO: The ASA Crypto hardware accelerator IPsec ring timed out

There is traffic loss over the tunnel when the crash happens and the below message is also seen.
%ASA-4-402123: CRYPTO: The ASA hardware accelerator encountered an error (Unknown Error, code= 0x7F) while executing the command Process IPSec Inbound Packet (0x30)

Conditions:
ASA 5506-X acting as IKEv1 or IKEv2 IPSec Termination point such as L2L VPN end-point.

Workaround:
NA

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.3(2.2), 9.3(3), 9.4(1)
Known Fixed Releases:
100.12(0.129), 100.13(0.79), 100.14(0.41), 100.14(5.20), 100.14(7.38), 100.15(0.15), 100.15(1.20), 100.15(2.54), 100.15(3.8), 100.15(4.12)
Bug Id:
CSCtu39738
Title:
ASA 5585 reloads with traceback in Thread Name: NIC status poll
Description:

<B>Symptom:</B>

ASA 5585 may go into a boot loop with traceback in Thread Name: NIC status poll

Before the box enters the traceback you will see several messages on the console that look like
this:

INFO: MIGRATION - Saving the startup configuration to file

INFO: MIGRATION - Startup configuration saved to file 'flash:8_2_4_0_startup_cfg
.sav'
*** Output from config line 4, "ASA Version 8.2(4) "
.....Failed to change interface status: cannot get channel
*** Output from config line 442, "interface GigabitEtherne..."
Failed to change interface status: cannot get channel
*** Output from config line 443, " shutdown"
Failed to change interface status: cannot get channel
*** Output from config line 448, "interface GigabitEtherne..."
Failed to change interface status: cannot get channel
*** Output from config line 449, " shutdown"
.Failed to change interface status: cannot get channel
*** Output from config line 454, "interface GigabitEtherne..."
Failed to change interface status: cannot get channel
*** Output from config line 455, " shutdown"
Failed to change interface status: cannot get channel



<B>Conditions:</B>

ASA 5585 only. Running 8.4.2 with an IPS SSP installed in slot 1

<B>Workaround:</B>

Remove the IPS SSP from the chassis and the boot loop should end. The trigger for this behavior is related to using the switch on the PSU to power cycle the box. If you have an IPS blade in the chassis and you power cycle the 5585 via the switch on the PSU you may see this behavior.

Call TAC to get your IPS SSP replaced.
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
29-JUN-2015
Known Affected Releases:
8.4(2)
Known Fixed Releases:
Bug Id:
CSCuu67411
Title:
Timeout:FloatingConnection valid(0:0:30-1193:0)remove http &telnet confg
Description:

Timeout:FloatingConnection valid(0:0:30-1193:0)remove http &telnet confg

Symptom:
Configure "timeout floating-conn 0:01:00"(any valid range 0:0:30-1193:0:0),it is configured in ASA and checking TELNET to ASA and HTTP connection of ASA is lost.

Conditions:
Issue on :
1.Saleen -5512,5525
2.Kenton--5506
3.vASA

Workaround:
Set the "timeout floating-conn 0:00:00"

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
100.14(0.27), 100.14(0.30), 100.14(6.38)
Known Fixed Releases:
100.14(0.42), 100.14(5.20), 100.14(7.39), 100.15(0.16), 100.15(1.20), 100.15(2.54), 100.15(3.8), 100.15(4.12), 100.15(5.15), 100.15(8.3)
Bug Id:
CSCuj23318
Title:
ASA 9.1 enabling IKE on one interface reserves UDP 500 on ALL interfaces
Description:

Symptom:
When enabling IKE on an interface the command is rejected with error message "ERROR: IkeReceiverInit, unable to bind to port"

Conditions:
-- ASA configured with static PAT statement forwarding UDP port 500 to internal host.
-- IKE is being enabled on a different interface than the one used in Static PAT with UDP 500.

Workaround:
-- remove the Static PAT command.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
8.0, 9.1(2.8)
Known Fixed Releases:
100.10(0.42), 100.10(1.21), 100.10(2.3), 100.10(3.1), 100.10(9.1), 100.8(38.70), 100.8(40.46), 100.8(46.40), 100.8(51.9), 100.9(10.17)
Bug Id:
CSCuu66218
Title:
ASA is not correctly handling errors on AES-GCM ICV
Description:

Symptom:
A vulnerability in the AES-GCM code of Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to modify the contents of an encrypted IPSec or IKEv2 packet, and for those modifications not to be detected.

The vulnerability is due to an error on the firmware of the Cavium Networks cryptographic module. Due to this vulnerability, the ICV is not checked. An attacker could exploit this vulnerability by intercepting encrypted packets in transit and modifying their contents. Such packets would be decrypted by the ASA and then forwarded to their destination, without the modification being detected.

Please note that this vulnerability does NOT allow an attacker to decrypt the packets in transit, nor obtain information about the session keys being used for the security association.

This vulnerability does NOT impact SSL/TLS traffic originated or destined to the ASA.

Conditions:
An IKEv2 or an IPSec policy using any of the following algorithms for data encryption: aes-gcm, aes-gcm-192, aes-gcm-256.

This vulnerability only applies to the following ASA models: ASA5506-X (all hardware models), ASA5508-X, and ASA5516-X.

Workaround:
There is no workaround for customers whose security policy requires the use of AES-GCM.

For customers that can use an alternative encryption algorith, IKE or IPSec policies using AES-GCM could be changed to use instead AES.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:OF/RC:C

CVE ID CVE-2015-4550 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.3(3), 9.4(1.1)
Known Fixed Releases:
100.12(0.128), 100.13(0.78), 100.13(21.16), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 9.3(3.2), 9.4(1.2), 99.1(2.170)
Bug Id:
CSCze96017
Title:
Active ftp-data is blocked by Firepower on Chivas Beta on 5512
Description:

Symptom:
The system incorrectly processes data channels matching applied access control, intrusion, and network discovery policies.

Conditions:
Configure an ASA FirePOWER module running Version 5.0 or later with network address translation (NAT).

Workaround:
1. Create a policy to allow ftp-data traffic from Server to Client
or
2. Use passive FTP

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.3(1)
Known Fixed Releases:
Bug Id:
CSCtg76404
Title:
Traceback in Thread Name: Checkheaps due to logging
Description:

Symptom:
An ASA may crash citing Checkheaps as the crashing thread.

Conditions:
This has been seen in ASA version 8.2.2 and presumably other builds as well. The crash appears to be related top the presence of 'logging flash-bufferwrap'

Workaround:
At this point. Disabling 'logging flash-bufferwrap' may prevent the crash.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
8.2(2), 8.2(3), 8.3(2)
Known Fixed Releases:
100.7(13.24), 100.7(14.13), 100.7(17.5), 100.7(18.1), 100.7(6.44), 100.7(8.34), 100.7(9.57), 100.8(0.19), 100.8(10.25), 100.8(12.26)
Bug Id:
CSCuu95947
Title:
Traceback assert in Thread Name: tcp_thread
Description:

Symptom:
ASA Traceback under tcp_thread

Conditions:
ASA running 8.2.5.48

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
8.2(5.48)
Known Fixed Releases:
Bug Id:
CSCug88962
Title:
Hitless upgrade fails with error "Number of interfaces...not consistent"
Description:

Symptom:
When attempting to perform a hitless upgrade of a failover pair of ASAs from a version prior to versions 8.4(6) and 9.0(2) and 9.1(1)3 to a version at or after 8.4(6) and 9.0(2) and 9.1(1)3 might fail. When the standby boots up with the new version, failover synchronization might fail and the following error might be printed to the console:

"Number of interfaces on Active and Standby are not consistent.If the problem persists, you should disable and re-enable failover on the Standby."

Conditions:
To encounter the problem, all of the following conditions must be met:

1) The ASAs must be in a failover setup
2) A hitless upgrade must be attempted. This involves loading the new code version onto the disk of the standby ASA, then rebooting it so that it boots up running the new version, and syncs with the active ASA.
3) The active ASA running the old code must be running a version of code prior to 8.4(6), 9.0(2), or 9.1(1)3
4) The standby ASA must be rebooted and running a version of code 8.4(6) or 8.4(6)1, 9.0(2) or 9.1(2) or later

Workaround:
Since the synchronization of the ASAs fails due to this bug, a hitless upgrade might not work. The workaround is to configure both ASAs to boot up with the new version of code, and reload both ASAs (first the standby ASA, then 30 seconds later the Active ASA). Both units will boot up ok, and then since both units are running the same version of code they will synchronize correctly.

Further Problem Description:
And in the above situation i.e after the standby was reloaded and the error message ""Number of interfaces on Active and Standby are not consistent.If the problem persists, you should disable and re-enable failover on the Standby." shows up on the device console, if a failover would be performed to make the standby unit take the active role, then there could be issues with MAC address switchover between the ASA devices i.e the new active unit may not use the previous active device's MAC address or the new standby unit may not use the previous standby's MAC address.

This would result in traffic flows failing through the ASA failover pair.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
8.4(6.1)
Known Fixed Releases:
100.7(6.118), 100.8(27.83), 100.8(38.18), 100.8(40.6), 100.8(41.2), 100.8(60.15), 100.9(0.46), 100.9(10.1), 100.9(6.28), 100.9(7.24)
Bug Id:
CSCuu39636
Title:
Cert Auth fails with 'max simultaneous-login restriction' error
Description:

Symptom:
VPN Clients connections with Certificate Authentication fail with the following error:

[IKEv1]Group = , IP = X.X.X.X, Session terminated due to 'X' max simultaneous-login restriction.

Conditions:
VPN Cients with Certificate Authentication

ASA running 9.1.6 or later

Workaround:
Use PSK and X-Auth for authentication
Downgrade to a non-affected version

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.1(6), 9.4(1)
Known Fixed Releases:
100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.37), 100.15(0.13), 100.15(1.15)
Bug Id:
CSCuu48197
Title:
ASA: Stuck uauth entry rejects AnyConnect user connections
Description:

Symptom:
Intermittently, the User VPN sessions fail to establish due to a stuck uauth entry associated with the same Pool/to-be-Assigned IP address of the new User.

Syslog:
%ASA-5-722010: Group User IP SVC Message: 16/ERROR: Detected internal error in SSL connection..
%ASA-4-113019: Group = , Username = , IP = , Session disconnected. Session Type: SSL, Duration: 00:00m:12s, Bytes xmt: 0, Bytes rcv: 0, Reason: User Requested

- While debugging, we see the following:

debug webvpn anyconenct:
webvpn_cstp_accept_address: 192.168.1.10/255.255.255.0
''snip''
vpn_put_uauth failed!
webvpn_cstp_send_error: 503 Service Unavailable

sh ip local pool :
shows that the address 192.168.1.10 is available.

debug pix uauth:
vpn_putuauth: ERR: uxlate collision for ip 192.168.1.10 user USER-B on interface OUTSIDE

show uauth:
remote access VPN user 'USER-A' at 192.168.1.10, authenticated <<< Stuck entry for "another user"

show vpn-sessiondb anyconnect filter name USER-A :
no entries

here, notice that the address that is being assigned to USER-B is 192.168.1.10, and this is available in the local pool I.e. This address was assigned to another user [USER-A] in the past. This user does not show up in the vpn-sessiondb indicating that he has already logged off.

Conditions:
ASA running on OS version [Ex: 9.2(1)] that has the fix for:
CSCuh08432 Anyconnect sessions do not connect due to uauth failure

This ASA is acting as AnyConnect SSLVPN Server.

Workaround:
None.
Either reload the ASA or failover to the standby ASA.

Or Start using a new IP address pool for the Connection entry

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.2(1)
Known Fixed Releases:
Bug Id:
CSCuu69193
Title:
ASA crash in Thread Name: CP HA Processing.
Description:

Symptom:
ASA failover pair crashing in Thread Name: CP HA Processing.

Conditions:
L2L VPN Tunnel is configured on the ASA

Workaround:
No workaround

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.2(2.8)
Known Fixed Releases:
Bug Id:
CSCtt27599
Title:
Standby Firewall traceback citing nat_remove_policy_from_np+383
Description:

Symptom:

When a Standby ASA tries to sync its config from its Active mate, the ASA may generate a traceback in the fover_parse thread and reload.

Conditions:

All of the following conditions must be met:

1. The ASA must be configured in a failover pair
and
2. The ASA must be configured with a NAT rule that uses the 'any' keyword as one of its interfaces. For example:

object network hostA
host 192.168.1.10
nat (inside,any) static 10.0.0.10

Workaround:

Avoid using the 'any' keyword as an interface in the NAT command.

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
100.8(19.22), 8.4(2.16)
Known Fixed Releases:
100.7(13.38), 100.7(14.28), 100.7(17.5), 100.7(18.3), 100.7(6.46), 100.7(8.34), 100.8(0.34), 100.8(15.9), 100.8(17.6), 100.8(19.24)
Bug Id:
CSCup47195
Title:
ASA - Traceback in DATAPATH-0-1275
Description:

Symptom:
ASA can traceback in Thread Name: DATAPATH under heavy load when IPS / CX / SFR module is installed

Conditions:
ASA 5512 / 5515 / 5525 / 5545 / 5555

Workaround:
not known

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
100.11(0.20), 100.12(0.39), 100.8(38.133), 100.8(64.12), 100.8(64.21), 9.1(3), 9.2(1)
Known Fixed Releases:
100.11(0.47), 100.12(0.51), 100.12(22.1), 100.12(6.8), 100.13(0.3), 100.13(12.5), 100.13(13.1), 100.13(14.3), 100.13(15.2), 100.13(16.1)
Bug Id:
CSCtw75734
Title:
tmatch compile thread assertion in "stride_terminal_node.c"
Description:

Symptom:
In a rare corner case, the ASA might traceback when there are ACL related functions being processed.

This is similar to CSCsy93944 but the traceback condition is due to a different root cause.

Conditions:
The traceback condition is related to the access-list structures stored on the ASA.

Workaround:
None known.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
100.8(46.4), 8.2(5), 8.4(5.2), 8.6(1.6)
Known Fixed Releases:
100.10(0.36), 100.10(1.21), 100.10(2.2), 100.10(3.1), 100.10(9.1), 100.7(6.125), 100.8(38.63), 100.8(40.40), 100.8(45.8), 100.8(46.28)
Bug Id:
CSCti05769
Title:
Migration of max_conn/em_limit to MPF is completely wrong in 8.3
Description:

Symptoms:
Migration to Modular Policy Framework may yield an incorrect configuration. This may result in loss of TCP Intercept protection against SYN
floods coming from the outside as MPF limits are configured in incorrect direction. Protection against server overloading may also be lost
because the migrated configuration incorrectly limits the number of outbound established connections from the server to the outside.

Conditions:

Workaround:
Configuration, created by migration process, must be removed and limits must be set manually via MPF and in proper direction.

Further Problem Description:

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
8.3(1)
Known Fixed Releases:
Bug Id:
CSCuu86195
Title:
conn-max counter is not decreased accordingly
Description:

Symptom:
Problem description:
- after the maximum number of TCP connections for a class-map are exceeded the counter for the active connections("current conns") starts to decrease into negative values
- all the new connections that are matching our configured policy are dropped even if we are not exceeding the number of configured connections
%ASA-3-201011: Connection limit exceeded -36/30 for input packet from 10.100.48.4/54675 to 172.29.41.10/8443 on interface in

Similar scenarios:
- legitimate connections are dropped when the counter:
- "current conns" is decreased into negative values; Ex: -36/30
- "current conns" is not dropping to zero(after all the connections are closed) and is stuck to a random value; Ex: 26/30 --> just 4 new connectios are allowed
- "current conns" is going over the maximum value and is not dropping to zero(after all the connections are closed); Ex: 32/30

Conditions:
issue observed in ASA software version 9.2.2 and 9.2.24(tested versions) just for TCP traffic

Workaround:
N/A

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.2(2), 9.2(2.4)
Known Fixed Releases:
Bug Id:
CSCty35830
Title:
AnyConnect users can't connect due to duplicate session.
Description:

Symptom:
AnyConnect connections are failing to an ASA cluster with syslogs reporting:
%ASA-4-113038: Group User IP Unable to create AnyConnect parent session.
Conditions:
This was observed on ASA platforms with a high rate of connection after some operating time.

Workaround:
None at this time other than reloading the ASA.

Status:
Other
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
8.4(3)
Known Fixed Releases:
Bug Id:
CSCug39080
Title:
HA sync configuration stuck -"Unable to sync configuration from Active"
Description:

Symptom:
HA sync configuration stuck -"Unable to sync configuration from Active"

Conditions:
Reloading the standby or reconfiguring failover on the standby does not resolve the issue.

Workaround:
reload the active unit.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.0(1)
Known Fixed Releases:
100.10(0.6), 100.8(27.84), 100.8(38.22), 100.8(40.11), 100.8(41.2), 100.8(60.27), 100.9(0.54), 100.9(10.1), 100.9(6.29), 100.9(7.37)
Bug Id:
CSCut88287
Title:
ASA Traceback in vpnfol_thread_msg
Description:

Symptom:
ASA device Traceback in vpnfol_thread_msg

Conditions:
ASA device running in Active/Standby HA Pair.

Workaround:
NONE

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
9.4(1)
Known Fixed Releases:
100.12(0.130), 100.13(0.79), 100.14(0.42), 100.14(5.20), 100.14(7.39), 100.15(0.16), 100.15(1.20), 100.15(2.53), 100.15(3.8), 100.15(4.12)
Bug Id:
CSCuq77655
Title:
Cisco ASA DNS Memory Exhaustion Vulnerability
Description:

Symptom:
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

Cisco ASA Failover Command Injection Vulnerability
Cisco ASA DNS Memory Exhaustion Vulnerability
Cisco ASA VPN XML Parser Denial of Service Vulnerability

Successful exploitation of the Cisco ASA Failover Command Injection Vulnerability would allow an attacker to submit failover commands to the failover units, which may result in an attacker taking full control of the systems.

Successful exploitation of the Cisco ASA DNS Memory Exhaustion Vulnerability may result in system instability and dropped traffic.

Successful exploitation of the Cisco ASA VPN XML Parser Denial of Service Vulnerability may result in a crash of the WebVPN process, which may lead to the reset of all SSL VPN connections, system instability, and a reload of the affected system.


Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available for the Cisco ASA Failover Command Injection Vulnerability and Cisco ASA DNS Memory Exhaustion Vulnerability. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa

Note: The resolution of the vulnerability in the Cisco Security Advisory Cisco ASA FirePOWER Services and Cisco ASA CX Crafted Packets Denial of Service Vulnerability, cisco-sa-20150408-cxfp, released on the 8th of April may require an upgrade of the Cisco ASA Software release. Cisco ASA customers should review cisco-sa-20150408-cxfp before deciding which Cisco ASA Software release to upgrade to.

The Cisco Security Advisory Cisco ASA FirePOWER Services and Cisco ASA CX Crafted Packets Denial of Service Vulnerability is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-cxfp

Conditions:
See published Cisco Security Advisory

Workaround:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS sscores as of the time of evaluation are 7.1/5.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
CVE ID CVE-2015-0676 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.4(7)
Known Fixed Releases:
100.11(0.48), 100.12(0.52), 100.12(22.1), 100.12(6.8), 100.13(0.3), 100.13(12.6), 100.13(13.1), 100.13(14.3), 100.13(15.2), 100.13(16.1)
Bug Id:
CSCsm84110
Title:
ASA may traceback with malformed TCP packets
Description:

Summary: Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. This security advisory outlines details of these vulnerabilities:

* Crafted TCP ACK Packet Vulnerability
* Crafted TLS Packet Vulnerability
* Instant Messenger Inspection Vulnerability
* Vulnerability Scan Denial of Service
* Control-plane Access Control List Vulnerability

The first four vulnerabilities may lead to a denial of service (DoS) condition and the fifth vulnerability may allow an attacker to bypass control-plane access control lists (ACL).

Note: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another.

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20080604-asa.shtml

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
7.1, 8.1(0.184)
Known Fixed Releases:
7.1(2.70), 7.2(3.22), 8.0(103.4), 8.0(3.10), 8.1(0.185), 8.1(1.1), 8.1(1.2)
Bug Id:
CSCtg28821
Title:
ASA: AAA Session limit [2048] reached when xauth is disabled for vpn
Description:

Symptom:

If there are more than 2048 ipsec remote access connections to a ASA55550 without user authentication, vpn and ssh/telnet connnections may fail.

The following messages may appear in the ASA logs:



Apr 14 2010 15:48:08: %ASA-3-113001: Unable to open AAA session. Session limit [2048] reached
Apr 14 2010 15:48:08: %ASA-7-713906: Group = Banricompras, IP =
200.132.64.2, Failed opening authentication session!



Workaround:

Enable xauth, and this will prompt user for authentication credentials

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2(1)
Known Fixed Releases:
100.7(0.9), 7.2(5.16), 8.0(5.17), 8.1(2.45), 8.2(2.102), 8.2(2.13), 8.3(1.100), 8.3(1.3), 8.4(0.99), 8.4(1)
Bug Id:
CSCsr40360
Title:
iPhone 2.0 SW requires that ASA/PIX 7.x+ address mask is 255.255.255.255
Description:

Symptom:
Third Party VPN connection may cause unintended VPN interruption for other connected users.

Conditions:
The following ASA/PIX versions are impacted by this:

Cisco Adaptive Security Appliance models 5505-5550 - All releases prior to 8.0.4

Cisco Adaptive Security Appliance model 5580 - All releases prior to 8.1.1.8
(Customers must contact the Cisco TAC for access to this version)

Cisco PIX Security Appliance - All 7.x and 8.x releases prior to 8.0.4

With IPsec enabled on the ASA/PIX not running the minimum versions listed above, it is possible to cause a VPN interruption if one of the following configuration steps are not taken.

Workaround:
For customers unable to upgrade to the minimum versions listed above, a workaround option is available for administrators who intend to allow access from the iPhone/iPod Touch 2.0 VPN Clients. This issue has been resolved with the iPhone/iPod Touch 2.1 release.

-----------------------------------------------------------

Allow iPhone/iPod Touch VPN connections (ASA/PIX 7.x+):

We recommend creating a new VPN group specifically for iPhone/iPod touch users if there is a mask set for your existing address pool or if DHCP address assignment is in use. A special group will also allow you to set customized security policies, such as providing these mobile users access to specific resources.

For the new group created for the iPhone, ensure that an address pool is utilized and either no mask command is set or if a mask is set, that it is set to 255.255.255.255.

Example: asa(config-webvpn)# ip local pool iphone_users 10.0.0.1-10.0.0.254

OR

asa(config-webvpn)# ip local pool iphone_users 10.0.0.1-10.0.0.254 mask 255.255.255.255

You may also set up a permit rule to limit this access to this group to iPhones. In the group policy, enable the following rule:

client-access-rule 10 permit type iPhone* version *

For any groups that have an appropriate address pool mask assigned to them or are set up for DHCP address assignment, you should follow the instructions in the field notice to deny connections to these groups.

-----------------------------------------------------------

If corporate policy is to restrict VPN access from the iPhone and iPod Touch 2.x, please use the configuration settings below.

Deny iPhone/iPod Touch VPN connections (ASA/PIX 7.x+):

In the group policy, enable the following rule:

client-access-rule 10 deny type iPhone* version *
client-access-rule 20 permit type * version *

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(3)
Known Fixed Releases:
7.0(8.1), 7.1(2.74), 7.2(4.9), 8.0(3.33), 8.1(1.100), 8.1(101.5), 8.2(0.140)
Bug Id:
CSCsv86258
Title:
Crafted ESP packet may reload ASA
Description:

<B>Symptom:</B>
Box will crash due to an assert with a malformed IPSEC ESP packet is received.
Under rare circumstances, if an ASA 5580 firewall receives a malformed ESP packet from a valid IPSec peer
the device might reload.

<B>Conditions:</B>
All of the following conditions must be met to be succeptible to this bug:
1) The VPN terminating device must be a ASA 5580
2) The 5580 must receive a malformed ESP packet

<B>Workaround:</B>
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.1(2)
Known Fixed Releases:
8.1(2.7), 8.2(0.181), 8.2(1)
Bug Id:
CSCsu12382
Title:
Some TLS packets may cause incorrect DMA mappings, leading to traceaback
Description:

Symptom:

An ASA on rare occasions will crash after processing crafted TLS packets.

Conditions:

This affects all versions of 8.1 code without the fix integrated.

Workaround:

None.

Further Problem Description:

None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.1(101.8)
Known Fixed Releases:
8.1(1.100), 8.1(1.9), 8.2(0.151)
Bug Id:
CSCsr74439
Title:
PIX/ASA: Certain malformed NAT-T packets may cause IKE process to hang
Description:

Symptom:

A Cisco PIX or Cisco ASA IKE process may stop processing IKE packets when certain malformed NAT-T packets are received.

Note: No IKE debugs are seen after the malformed packet is sent.

Conditions:
Cisco PIX/ASA configured to terminate IPSec remote access or site-to-site tunnels.

Workaround:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
7.2(4), 8.0(3.20)
Known Fixed Releases:
7.0(8.1), 7.1(2.75), 7.2(4.9), 8.0(4.5), 8.1(1.100), 8.1(101.6), 8.2(0.145)
Bug Id:
CSCso66472
Title:
Crypto memory leak causing Clientless SSL VPNs to hang
Description:

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances that may result in a reload of the device or disclosure of confidential information. This security advisory outlines details of the following vulnerabilities:

Erroneous SIP Processing Vulnerabilities

IPSec Client Authentication Processing Vulnerability

SSL VPN Memory Leak Vulnerability

URI Processing Error Vulnerability in SSL VPNs

Potential Information Disclosure in Clientless VPNs

Note: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080903-asa.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(3), 8.0(3.10), 8.0(3.7)
Known Fixed Releases:
7.2(4.2), 8.0(103.16), 8.0(3.14), 8.1(1.4)
Bug Id:
CSCso69942
Title:
Traceback in Remote Access Authentication Code
Description:

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances that may result in a reload of the device or disclosure of confidential information. This security advisory outlines details of the following vulnerabilities:

Erroneous SIP Processing Vulnerabilities

IPSec Client Authentication Processing Vulnerability

SSL VPN Memory Leak Vulnerability

URI Processing Error Vulnerability in SSL VPNs

Potential Information Disclosure in Clientless VPNs

Note: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080903-asa.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
7.2(2.19)
Known Fixed Releases:
7.2(4.2), 8.0(103.23), 8.0(3.14), 8.1(1.4)
Bug Id:
CSCup36829
Title:
Cisco ASA SSL VPN Portal Customization Integrity Vulnerability
Description:

Symptom:
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Denial of Service Vulnerability
Cisco ASA IKEv2 Denial of Service Vulnerability
Cisco ASA High Performance Monitor Denial of Service Vulnerability
Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability
Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability
Cisco ASA DNS Inspection Engine Denial of Service Vulnerability
Cisco ASA VPN Failover Command Injection Vulnerability
Cisco ASA VNMC Command Input Validation Vulnerability
Cisco ASA Local Path Inclusion Vulnerability
Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability
Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability
Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability

These vulnerabilities are independent of one another; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of the Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability, Cisco ASA VPN Denial of Service Vulnerability, Cisco ASA IKEv2 Denial of Service Vulnerability, Cisco ASA High Performance Monitor Denial of Service Vulnerability, Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service Vulnerability, Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability, and Cisco ASA DNS Inspection Engine Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition.

Successful exploitation of the Cisco ASA VPN Failover Command Injection Vulnerability, Cisco ASA VNMC Command Input Validation Vulnerability, and Cisco ASA Local Path Inclusion Vulnerability may result in full compromise of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Information Disclosure and Denial of Service Vulnerability may result in the disclosure of internal information or, in some cases, a reload of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability may result in a compromise of the Clientless SSL VPN portal, which may lead to several types of attacks, which are not limited to cross-site scripting (XSS), stealing of credentials, or redirects of users to malicious web pages.

Successful exploitation of the Cisco ASA Smart Call Home Digital Certificate Validation Vulnerability may result in a digital certificate validation bypass, which could allow the attacker to bypass digital certificate authentication and gain access inside the network via remote access VPN or management access to the affected system via the Cisco Adaptive Security Device Management (ASDM).

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa

Conditions:
See published Cisco Security Advisory

Workaround:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS sscores as of the time of evaluation are 8.3/7.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:C/A:P/E:F/RL:OF/RC:C
CVE ID CVE-2014-3393 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be fou

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
30-JUN-2015
Known Affected Releases:
8.1(2.7), 9.1(5.231)
Known Fixed Releases:
100.11(0.28), 100.11(5.40), 100.11(6.4), 100.12(0.14), 100.12(1.5), 100.12(12.2), 100.12(13.8), 100.12(15.2), 100.12(16.6), 100.12(17.10)
Bug Id:
CSCug52259
Title:
ROMMON: eUSB device not recognized by BIOS on boot
Description:

Symptom:
ASA or IPS goes into a 'boot loop' after resetting the device, where the ASA/IPS is unable to find a boot image with errors similar to the following:

Launching BootLoader...
Default configuration file contains 1 entry.

Searching / for images to boot.

No images in /
Error 15: File not found

Conditions:
This issue has been seen on 5585, SSP-10, and 4510/4520 devices.

The problem is independent of IPS version, so any IPS version can be affected. The issue can only be corrected with a BIOS update or RMA, which TAC can provide.

Workaround:
None.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
0
Known Fixed Releases:
Bug Id:
CSCuu39615
Title:
eglibc 2.18 is missing upstream fix #15073
Description:

Symptom:
ASA could crash due to heap corruption

Conditions:
Heavy memory allocation

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
9.3(2), 9.3(2.2)
Known Fixed Releases:
100.12(0.127), 100.13(0.77), 100.13(21.16), 100.14(0.30), 100.14(5.19), 100.14(7.38), 100.15(0.13), 100.15(1.18), 100.15(2.54), 100.15(3.7)
Bug Id:
CSCsr09163
Title:
webvpn - +webvpn+/index.html http response splitting problem
Description:

Symptom:

The ASA is vulnerable to HTTP response splitting.

Detail on HTTP response splitting defects :

http://en.wikipedia.org/wiki/HTTP_response_splitting
http://www.owasp.org/index.php/HTTP_Response_Splitting

An attacker can insert arbitrary HTTP headers into the responses from the ASA by specifying specially formatted input to the tgroup input form field.

Cisco has published a vendor response at the following URL:

http://tools.cisco.com/security/center/viewAlert.x?alertId=20737

This vulnerability was discovered by Daniel King of SecureWorks, Inc. Cisco greatly appreciates the opportunity to work with researchers on security vulnerabilities, and welcome the opportunity to review and assist in product reports.

Conditions:

This is default behavior for the ASA.

Workaround:

There are no workarounds for this issue.

The following Cisco Applied Mitigation Bulletin titled: Understanding Cross-Site Scripting (XSS) Threat Vectors provide several best practices and information that can be used to mitigate these type of issues:

http://www.cisco.com/warp/public/707/cisco-amb-20060922-understanding-xss.shtml

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0
Known Fixed Releases:
8.0(3.30), 8.1(1.100), 8.1(101.4), 8.2(0.140)
Bug Id:
CSCsk60581
Title:
Device reload possible when SIP inspection is enabled
Description:

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances that may result in a reload of the device or disclosure of confidential information. This security advisory outlines details of the following vulnerabilities:

Erroneous SIP Processing Vulnerabilities

IPSec Client Authentication Processing Vulnerability

SSL VPN Memory Leak Vulnerability

URI Processing Error Vulnerability in SSL VPNs

Potential Information Disclosure in Clientless VPNs

Note: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080903-asa.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
7.2, 8.0
Known Fixed Releases:
7.2(3.14), 7.2(3.18), 8.0(3.3), 8.0(3.8), 8.1(0.137), 8.2(0.80), 8.2(0.94)
Bug Id:
CSCsu90653
Title:
ASA: Disabling Isakmp User Auth Causes Webvpn Authentication to Fail
Description:

<B>Symptom:</B>

if a tunnel-group with ldap authentication and authorization is configured for webvpn and ipsec, and the
ipsec-attributes have

isakmp ikev1-user-authentication none

configured, the ldap process receives a type 0 request. This bypasses authentication and allows any with
a valid username to have access to webvpn even if the password is incorrect.

<B>Conditions:</B>

if a tunnel-group with ldap authentication and authorization is configured for webvpn and ipsec, and the
ipsec-attributes have

isakmp ikev1-user-authentication none

<B>Workaround:</B>

none

<B>Further Problem Description:</B>

<!-- This section can include additional information to allow the -->
<!-- customer to understand the problem in more detail. -->
<!-- -->
<!-- This field might include: -->
<!-- A broader description of the conditions under which the problem -->
<!-- might occur. Description of why the problem occurred (e.g., -->
<!-- RFC noncompliance). -->
<!-- -->
<!-- Don't include customer configurations, customer names, passwords, -->
<!-- decoded stack traces, or any other information that could -->
<!-- compromise a site's security. -->

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4)
Known Fixed Releases:
7.2(4.17), 8.0(4.8), 8.0(5), 8.1(2.2), 8.2(0.165), 8.2(1)
Bug Id:
CSCuu73694
Title:
ASA Traceback in Thread Name: Dispatch Unit
Description:

Symptom:
ASA unexpectedly crash with "Thread Name: Dispatch Unit".

Conditions:
unknown

Workaround:
There is no workaround at this time.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.4(7.23)
Known Fixed Releases:
Bug Id:
CSCsq45636
Title:
Potential Information Disclosure in Clientless SSL VPNs
Description:

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances that may result in a reload of the device or disclosure of confidential information. This security advisory outlines details of the following vulnerabilities:

Erroneous SIP Processing Vulnerabilities

IPSec Client Authentication Processing Vulnerability

SSL VPN Memory Leak Vulnerability

URI Processing Error Vulnerability in SSL VPNs

Potential Information Disclosure in Clientless VPNs

Note: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080903-asa.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(2), 8.0(3.12)
Known Fixed Releases:
8.0(103.27), 8.0(3.16), 8.1(1.6), 8.2(0.127)
Bug Id:
CSCte91042
Title:
SMTP Inspect Security Issue
Description:

Symptom:
Cisco ASA has a potential issue with its SMTP inspection engine, where an unauthenticated attacker may
bypass certain policies of the SMTP inspection.

Conditions:
Cisco ASA with default configuration.

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS
scores as of the time of evaluation are 4.3/3.4:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C

No CVE ID has been assigned to this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2
Known Fixed Releases:
100.4(0.47), 100.5(5.8), 100.7(2.1), 7.2(4.100), 7.2(5), 8.2(2.99), 8.2(4), 8.3(1.100), 8.4(1)
Bug Id:
CSCui76124
Title:
Unable to telnet to ASA due to telnet limit reached
Description:

Symptom:
Unable to telnet to the ASA due to the limit of 5 simultaneous sessions reached.

This situation can be verified with the output of 'show resource usage', which will show the output like below:
Resource Current Peak Limit Denied Context
Telnet 5 5 5 0 System

Conditions:
Telnet is used to manage the ASA

Workaround:
Reload or failover the ASA to mitigate the problem.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
9.0(3), 9.1(1)
Known Fixed Releases:
100.10(0.14), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.8(38.33), 100.8(40.22), 100.8(41.2), 100.8(45.2), 100.8(46.1), 100.8(49.1)
Bug Id:
CSCsq19369
Title:
URI Processing Error in Clientless SSL VPN connections
Description:

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances that may result in a reload of the device or disclosure of confidential information. This security advisory outlines details of the following vulnerabilities:

Erroneous SIP Processing Vulnerabilities

IPSec Client Authentication Processing Vulnerability

SSL VPN Memory Leak Vulnerability

URI Processing Error Vulnerability in SSL VPNs

Potential Information Disclosure in Clientless VPNs

Note: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080903-asa.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(3.13), 8.3
Known Fixed Releases:
8.0(103.24), 8.0(3.15), 8.1(1.5)
Bug Id:
CSCsx59014
Title:
ASA allows VPN user although Zonelabs Integrity firewall rejects
Description:

Symptom:
When Cisco ASA is configured to communicate with a zonelabs integrity Firewall server to validate VPN clients, it might be that the ASA is still permitting users to have network access despite not having the right policies and being rejected by the Firewall server.



Conditions:
unknown

Workaround:
no workaround currently available

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4)
Known Fixed Releases:
7.2(4.29), 8.0(4.161), 8.0(4.27), 8.0(5), 8.1(2.165), 8.1(2.18), 8.2(1.10), 8.2(4)
Bug Id:
CSCsq97154
Title:
ASA WebVPN HTTP Instability
Description:

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances that may result in a reload of the device or disclosure of confidential information. This security advisory outlines details of the following vulnerabilities:

Erroneous SIP Processing Vulnerabilities

IPSec Client Authentication Processing Vulnerability

SSL VPN Memory Leak Vulnerability

URI Processing Error Vulnerability in SSL VPNs

Potential Information Disclosure in Clientless VPNs

Note: These vulnerabilities are independent of each other. A device may be affected by one vulnerability and not affected by another. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of these vulnerabilities are available.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080903-asa.shtml.

Status:
Other
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.3
Known Fixed Releases:
Bug Id:
CSCsm77958
Title:
ASA may crash while processing PPPoE and SSL VPN transactions
Description:

Symptom:
When clientless SSL VPN client attempts to connect to ASA,
ASA crashes with threadname : IP Thread followed by the output below:

assertion "t->stack[0] == STKINIT" failed: file "thread.c", line 709

Condition:
- when clientless webvpn user attempts to establish SSL VPN.

Workaround:
None at this point

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(2), 8.0(3)
Known Fixed Releases:
7.0(7.12), 7.1(2.70), 7.2(3.21), 7.2(4), 8.0(3.10), 8.1(1.2), 8.2(0.100)
Bug Id:
CSCsq74674
Title:
ASA may reload after receiving certain EIGRP packets
Description:

Symptom:
ASA may reload after receiving certain EIGRP packets .

Conditions:
Cisco ASA configured for EIGRP routing.

Note: EIGRP support was initially introduced in Cisco ASA Version 8.0(2).

Workarounds:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(2), 8.0(3), 8.1(1.1), 8.1(1.6)
Known Fixed Releases:
8.0(103.34), 8.0(3.20), 8.1(1.100), 8.1(101.1), 8.2(0.130)
Bug Id:
CSCsv21224
Title:
ASA process invalid OSPF MD5 sequence numbers
Description:

Symptom:
Cisco ASA may process invalid OSPF MD5 sequence numbers.

This issue was found and reported to Cisco by Francois Ropert.
Cisco PSIRT greatly appreciates the opportunity to work with researchers on security vulnerabilities and
welcomes the opportunity to review and assist in product reports. We would like to thank Mr. Ropert for
working with us towards the goal of keeping Cisco networks and the Internet, as a whole, secure.

Conditions:
Cisco ASA running version 8.0.4 and earlier.

Workarounds:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4)
Known Fixed Releases:
7.2(4.22), 8.0(4.18), 8.0(4.220), 8.0(5), 8.1(2.8), 8.2(0.189), 8.2(1)
Bug Id:
CSCus47259
Title:
Cisco ASA XAUTH Bypass Vulnerability
Description:

Symptoms:
Due to a vulnerability in the IKEv1 code is it possible to bypass XAUTH authentication by sending crafted IKE messages

Conditions:
This applies only to deployment configured with Remote VPN and IKEv1.
The knowledge of the PSK or a valid certificate is needed to perform the attack.

This vulnerabilities affects only the following trains:
- 7.x
- 8.0
- 8.1
- 8.2 prior to 8.2.2.13

This issue has been fixed as part of another bug: CSCtg28821

Workaround:
none

Further Problem Description:

A vulnerability in IKE version 1 code of Cisco ASA Software could allow
an authenticated, remote attacker to bypass x-auth authentication and
successfully login via IPsec remote VPN.

The vulnerability is due to improper implementation of the logic of the
x-auth code . An attacker could exploit this vulnerability by sending
crafted IKEv1 packets to the affected system. The attacker would need to
know the tunnel group pre-shared-key or have a valid certificate in
order to exploit this vulnerability. This vulnerability affects only
Cisco ASA Software configured for IKEv1 IPSec remote access and IKEv1
IPSec Lan-to-Lan. An exploit could allow the attacker to bypass the
authentication and gain access to the network via remote VPN.


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:S/C:P/I:N/A:N/E:F/RL:U/RC:C
CVE ID CVE-2015-0760 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(2)
Known Fixed Releases:
100.11(0.58), 100.12(0.123), 100.13(0.68), 100.13(21.13), 100.14(0.10), 100.14(10.13), 100.14(26.11), 100.14(5.14), 100.14(6.14), 100.14(7.14)
Bug Id:
CSCuf07393
Title:
ASA assert traceback during xlate replication in a failover setup
Description:

Symptom:
An ASA firewall running in STANDBY as part of an Active/Standby or Active/Active high availability
configuration may crash citing an assert in thread name DATAPATH-x-xxxx.

Conditions:
The crash is seen in rare circumstances on a standby firewall or a firewall in an Active/Active high
availability configuration where some contexts are STANDBY on that firewall.

Workaround:
None at this time. In order to reduce the impact of crashes in an Active/Active failover configuration
you might want to move both ACTIVE Failover Groups to one ASA

More Info:

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for
another evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
9.1(1), 9.1(2)
Known Fixed Releases:
100.10(0.6), 100.8(27.83), 100.8(38.16), 100.8(40.6), 100.8(41.2), 100.8(60.12), 100.9(0.45), 100.9(10.1), 100.9(6.27), 100.9(7.23)
Bug Id:
CSCsr32004
Title:
ASA may crash after processing certain malformeded EIGRPpackets
Description:

Symptom:
ASA may reload after receiving certain EIGRP packets .

Conditions:
Cisco ASA configured for EIGRP routing.

Note: EIGRP support was initially introduced in Cisco ASA Version 8.0(2).

Workarounds:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0, 8.0(2), 8.0(3), 8.0(3.19), 8.0(3.31), 8.1
Known Fixed Releases:
8.0(4.5), 8.0(5), 8.1(1.100), 8.1(101.8), 8.2(0.149)
Bug Id:
CSCso58622
Title:
IPv6: IP services are reachable from the "far side of the box"
Description:

Symptom:

Users can connect to, and interact with the FW via an interface that they are not logically connected to.

Conditions:

PIX or ASA device running 7.x or higher code. Using IPv6 routing and IPv6 enabled services (SSH, Telnet, HTTP, ICMP).

Workaround:

Restrict access to services by IPv6 subnet. (i.e. no '' ::/0 '' type config)

Further Problem Description:

Cisco FW products are designed to be ''through the box'' type appliances. IPv6 should behave the same way IPv4 does. You should only be
interacting with the box via the interface that you are logically connected to.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C

CVE ID CVE-2009-4913 has been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(3)
Known Fixed Releases:
8.0(103.17), 8.0(103.18), 8.0(3.14), 8.1(1.4)
Bug Id:
CSCsx75440
Title:
ACL - Implicit deny ip any any ACE may not work as expected
Description:

Symptom:

Implicit deny any any may not work as expected. Traffic that is not permitted via the acl may be permitted even though the access-list may be applied on the higher security interface.

Conditions:

This was first observed in an ASA running 8.0.4(3)

Workaround:

1. Remove the access-group line applied on the interface and re-apply it.

example:
no access-group acl-inside in interface inside
access-group acl-inside in interface inside

or

2. add an explicit deny ip any any line in the bottom of the acl applied on that interface


Further Problem Description:

The following data collected may be helpful before contacting TAC

"sh asp table classify domain permit hits"
and
"sh asp table classify interface domain permit hits"

Status:
Other
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4.3)
Known Fixed Releases:
Bug Id:
CSCsy22484
Title:
Cisco ASA may traceback after processing certain TCP packets
Description:

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. This security advisory outlines the details of these vulnerabilities:

* VPN Authentication Bypass when Account Override Feature is Used vulnerability
* Crafted HTTP packet denial of service (DoS) vulnerability
* Crafted TCP Packet DoS vulnerability
* Crafted H.323 packet DoS vulnerability
* SQL*Net packet DoS vulnerability
* Access control list (ACL) bypass vulnerability

Workarounds are available for some of the vulnerabilities.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtml

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4), 8.2
Known Fixed Releases:
7.0(8.6), 7.1(2.81), 7.2(4.30), 8.0(4.28), 8.1(2.162), 8.1(2.19), 8.2(0.228), 8.2(4)
Bug Id:
CSCsk31007
Title:
SIP: traceback in Thread Name: Dispatch Unit
Description:

Symptom:
On PIX/ASA running version 7.2.3, using SIP inspection engine can cause traceback.

Conditions:
Enabled SIP inspection engine.

Workaround:
Disable SIP inspection engine.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
30-JUN-2015
Known Affected Releases:
7.2(2.33), 7.2(3)
Known Fixed Releases:
7.2(3.3), 7.2(4), 8.0(2.18), 8.1(0.71), 8.2(0.65)
Bug Id:
CSCuu53928
Title:
ASA does not set forward address or p-bit in OSPF redistrubution in NSSA
Description:

Symptom:
ASA can advertise OSPF routes to a peer with the p-bit disabled, and with a null forward address when in a Not so Stubby Area. This can cause the peer device to be unable to translate this LSA and forward it on to the rest of the topology.

OSPF Router with ID (10.0.0.50) (Process ID 1)
Type-7 AS External Link States (Area 100)

LS age: 23
Options: (No TOS-capability, No Type 7/5 translation, DC) <---
LS Type: AS External Link
Link State ID: 192.168.0.0 (External Network Number )
Advertising Router: 10.0.0.50
LS Seq Number: 80000001
Checksum: 0x791e
Length: 36
Network Mask:255.255.0.0
Metric Type: 2 (Larger than any link state path)
TOS: 0
Metric: 20
Forward Address: 0.0.0.0 <---
External Route Tag:

This condition occurs if the route that is advertised is directly connected, and that link comes up before the link that contains the OSPF neighborship.

Conditions:
- ASA in an OSPF Not So Stubby Area
- Redistributing Connected Routes
- Observed in single and multiple context
- Observed in failover mode or standalone mode

Workaround:
- Clear OSPF Process on ASA with command "clear ospf process"
- Bounce link of connected route that is being advertised incorrectly

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
9.3(1), 9.4(1)
Known Fixed Releases:
100.12(0.130), 100.13(0.80), 100.14(0.44), 100.14(5.21), 100.14(7.41), 100.15(0.16), 100.15(1.20), 100.15(2.53), 100.15(3.8), 100.15(4.12)
Bug Id:
CSCsx23387
Title:
Recoverable crash condition within aware http server
Description:








Symptom:
Crafted HTTP packets may drive CPU utilization to 100%.







Conditions:
WebVPN must be enabled.





Workaround:
None.




Further Problem Description:
None.













Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4)
Known Fixed Releases:
100.3(0.2), 100.4(0.2), 7.2(4.100), 8.0(4.25), 8.0(5), 8.1(2.15), 8.2(0.212), 8.2(4)
Bug Id:
CSCsy91157
Title:
Watchdog when inspecting malformed SIP traffic
Description:

Summary: Cisco ASA 5500 Series Adaptive Security Appliances are affected by the following vulnerabilities:

* TCP Connection Exhaustion Denial of Service Vulnerability
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerabilities
* Skinny Client Control Protocol (SCCP) Inspection Denial of Service Vulnerability
* WebVPN Datagram Transport Layer Security (DTLS) Denial of Service Vulnerability
* Crafted TCP Segment Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability
* NT LAN Manager version 1 (NTLMv1) Authentication Bypass Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

Cisco has released free software updates that address these vulnerabilities.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml.


Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4.29)
Known Fixed Releases:
8.0(4.161), 8.0(4.38), 8.0(5), 8.1(2.165), 8.1(2.29), 8.2(1.10), 8.2(4), 8.3(0.0)
Bug Id:
CSCsz90342
Title:
Malformed SIP packets may cause memory leak
Description:

Symptom:
Malformed TCP packets destined to a host behind the ASA over port 5060 may cause a memory leak on the
affected device. The device recovers after these packets are blocked or the attack is stopped.

Conditions:
Cisco ASA configured with TCP proxy for SIP.

Workaround:
None

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2(1)
Known Fixed Releases:
100.3(0.28), 100.4(0.27), 8.2(1.110), 8.2(2), 8.2(2.99), 8.2(4), 8.3(0.12), 8.3(1)
Bug Id:
CSCuv04901
Title:
NAT section-1 divert rules are getting added at the end of section-2
Description:

Symptom:
NAT section-1 divert rules are getting added at the end of section-2

Conditions:
Removing and re-adding a Twice NAT rule

Workaround:
Remove all the rules and re-add them again.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
9.1(5.21)
Known Fixed Releases:
Bug Id:
CSCug79778
Title:
ASA standby traceback in fover_parse when upgrading to 9.0.2
Description:

Symptom:
ASA crashing in fover_parse when upgrading to 9.0.2

Conditions:
N/A

Workaround:
N/A

More Info:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
9.0(2)
Known Fixed Releases:
100.10(0.6), 100.8(27.84), 100.8(38.20), 100.8(40.9), 100.8(41.2), 100.8(60.23), 100.9(0.52), 100.9(10.1), 100.9(6.28), 100.9(7.31)
Bug Id:
CSCtf81810
Title:
OpenSSL Record of death
Description:

Symptom:
The device may be affected by an OpenSSL vulnerability.

This vulnerability is tracked as CVE-2010-0740

In TLS connections, certain incorrectly formatted records can cause an OpenSSL
client or server to crash due to a read attempt at NULL.

Conditions:
Device configured with any feature that uses SSL.

Workaround:
Not available

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0, 8.3(1)
Known Fixed Releases:
100.4(0.54), 8.0(5.17), 8.1(2.44), 8.2(2.13), 8.2(2.99), 8.2(4), 8.3(1.100), 8.3(1.2), 8.4(1)
Bug Id:
CSCtd32106
Title:
mutated SIP Invite-Bye message causes ASA to watch dog and traceback
Description:

Summary

Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities as follows:

* Three SunRPC Inspection Denial of Service Vulnerabilities
* Three Transport Layer Security (TLS) Denial of Service Vulnerabilities
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100804-asa.shtml.

Note: The Cisco Firewall Services Module (FWSM) is affected by the SunRPC DoS vulnerabilities. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the FWSM. This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20100804-fwsm.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2(1), 8.3(0.12), 8.3(0.2)
Known Fixed Releases:
100.4(0.30), 8.0(5.17), 8.1(2.45), 8.2(2.13), 8.2(2.99), 8.2(4), 8.3(0.19), 8.3(1)
Bug Id:
CSCuu97304
Title:
SSL connection failing to WebVPN portal
Description:

Symptom:
access to webvpn portal broken

Conditions:
try to access the webvpn portal via a browser

Workaround:
None

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
100.12(0.130), 100.14(0.43)
Known Fixed Releases:
Bug Id:
CSCtf40074
Title:
watchdog when running set of Codenomicon TLS test cases
Description:

Summary

Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities as follows:

* Three SunRPC Inspection Denial of Service Vulnerabilities
* Three Transport Layer Security (TLS) Denial of Service Vulnerabilities
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100804-asa.shtml.

Note: The Cisco Firewall Services Module (FWSM) is affected by the SunRPC DoS vulnerabilities. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the FWSM. This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20100804-fwsm.shtml.

Status:
Other
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
100.4(0.43)
Known Fixed Releases:
Bug Id:
CSCut86523
Title:
ASA: Silently Drops packets with SFR Module installed.
Description:

Symptom:
Traffic through ASA with SFR module Redirection enabled is dropped

Conditions:
Destination MAC address of the Packet begins with the following.
00:23
00:20
00:0d

Workaround:
Change the destination MAC address of the Packet to begin with something other than 00:23, 00:20,00:0d

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
9.3(2.2)
Known Fixed Releases:
100.11(0.58), 100.12(0.124), 100.13(0.71), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.21), 100.14(7.20), 100.15(0.9)
Bug Id:
CSCte46507
Title:
ASA crash observed during isakmp testing with Codenomicon tool
Description:

Summary

Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities as follows:

* Three SunRPC Inspection Denial of Service Vulnerabilities
* Three Transport Layer Security (TLS) Denial of Service Vulnerabilities
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100804-asa.shtml.

Note: The Cisco Firewall Services Module (FWSM) is affected by the SunRPC DoS vulnerabilities. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the FWSM. This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20100804-fwsm.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4)
Known Fixed Releases:
100.4(0.46), 100.7(2.1), 7.2(4.100), 8.0(5.15), 8.1(2.44), 8.2(2.10), 8.2(4), 8.3(1.1), 8.4(1)
Bug Id:
CSCsx23611
Title:
VPN: TCP traffic allowed on any port with management-access enabled.
Description:

Symptom:

The firewall "inside" interface is responding to connection attempts on any port
(1-65536) when the initial SYN is going over a VPN tunnel.

Conditions:

When a firewall has a VPN setup on it's configuration, and connection requests are being
sent to the interface IP that is not terminating the VPN, the firewall responses to the
connection request, even though the application port does not exist. The three way handshake is
immediately followed by a reset packet which kills the connections.

The easiest way to verify you are running into this condition, is to send traffic across the
VPN tunnel with the command (where y.y.y.y is the inside interface of the firewall):

telnet <ip> <random port>

Here's an example:

telnet y.y.y.y 12345

If you're successful, you'll see the following in IOS:
Trying 192.168.100.1, 12345 ... Open

302013 Built inbound TCP connection 49230 for outside:x.x.x.x/4885 (x.x.x.x/4885) to NP
Identity Ifc:y.y.y.y/12345 (y.y.y.y/12345)
302014 Teardown TCP connection 49230 for outside:x.x.x.x/4885 to NP Identity Ifc:y.y.y.y/12345
duration 0:00:00 bytes 0 TCP Reset-I

Workaround:

No known workaround.

Conditions:

A VPN tunnel must terminate on the ASA and the "management-access" command must be
enabled.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(2.7), 8.0(4.20)
Known Fixed Releases:
100.3(0.2), 8.0(4.161), 8.0(4.27), 8.0(5), 8.1(2.165), 8.1(2.17), 8.2(1.10), 8.2(4)
Bug Id:
CSCsz79757
Title:
Traceback - Thread Name: Dispatch Unit with skinny inspect enabled
Description:

Summary: Cisco ASA 5500 Series Adaptive Security Appliances are affected by the following vulnerabilities:

* TCP Connection Exhaustion Denial of Service Vulnerability
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerabilities
* Skinny Client Control Protocol (SCCP) Inspection Denial of Service Vulnerability
* WebVPN Datagram Transport Layer Security (DTLS) Denial of Service Vulnerability
* Crafted TCP Segment Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability
* NT LAN Manager version 1 (NTLMv1) Authentication Bypass Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

Cisco has released free software updates that address these vulnerabilities.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml.


Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4), 8.2(1)
Known Fixed Releases:
8.0(4.161), 8.0(4.38), 8.0(5), 8.1(2.165), 8.1(2.29), 8.2(1.2), 8.2(4), 8.3(0.0)
Bug Id:
CSCtc47782
Title:
Malformed IKE traffic causes rekey to fail
Description:

Summary: Cisco ASA 5500 Series Adaptive Security Appliances are affected by the following vulnerabilities:

* TCP Connection Exhaustion Denial of Service Vulnerability
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerabilities
* Skinny Client Control Protocol (SCCP) Inspection Denial of Service Vulnerability
* WebVPN Datagram Transport Layer Security (DTLS) Denial of Service Vulnerability
* Crafted TCP Segment Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability
* NT LAN Manager version 1 (NTLMv1) Authentication Bypass Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

Cisco has released free software updates that address these vulnerabilities.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml.


Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0, 8.0(4)
Known Fixed Releases:
100.3(0.19), 7.2(4.45), 8.0(5.1), 8.1(2.37), 8.2(1.105), 8.2(1.15), 8.2(4), 8.3(0.5)
Bug Id:
CSCuu83280
Title:
Evaluation of OpenSSL June 2015
Description:



Symptom:

This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:

CVE-2015-4000, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-1791, CVE-2014-8176

This bug has been opened to address the potential impact on this product.



Conditions:

Exposure is not configuration dependent.

CVE-2015-1788 Malformed ECParameters causes infinite loop
Not affected in ASA versions before 9.4.1 where EC key support was added.

CVE-2015-1790 PKCS7 crash with missing EnvelopedContent
Not affected in any ASA versions. OpenSSL clients and servers are not affected.

Rest of the vulnerabilities affect ASA.




Workaround:

Not available.



Further Problem Description:


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the
time of evaluation are: 7.8/6.4

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C

The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
7.2(1), 8.2(1), 8.2(5), 9.0(1), 9.2(1), 9.3(2)
Known Fixed Releases:
100.12(0.131), 100.13(0.81), 100.14(0.51), 100.14(0.54), 100.15(0.17), 99.1(2.183)
Bug Id:
CSCsq91277
Title:
ACL Misbehavior in Cisco ASA
Description:

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. This security advisory outlines the details of these vulnerabilities:

* VPN Authentication Bypass when Account Override Feature is Used vulnerability
* Crafted HTTP packet denial of service (DoS) vulnerability
* Crafted TCP Packet DoS vulnerability
* Crafted H.323 packet DoS vulnerability
* SQL*Net packet DoS vulnerability
* Access control list (ACL) bypass vulnerability

Workarounds are available for some of the vulnerabilities.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtml

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(0.4), 8.0(103.25), 8.0(3.19), 8.0(4), 8.0(4.3)
Known Fixed Releases:
7.0(8.1), 7.1(2.74), 7.2(4.9), 8.0(4.5), 8.0(5)
Bug Id:
CSCtd32627
Title:
mutated SSLv3(recordclientalert type) causes ASA to traceback
Description:

Summary

Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities as follows:

* Three SunRPC Inspection Denial of Service Vulnerabilities
* Three Transport Layer Security (TLS) Denial of Service Vulnerabilities
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100804-asa.shtml.

Note: The Cisco Firewall Services Module (FWSM) is affected by the SunRPC DoS vulnerabilities. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the FWSM. This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20100804-fwsm.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.3(0.2)
Known Fixed Releases:
100.7(2.1), 7.2(4.100), 8.0(5.15), 8.1(2.44), 8.2(2.10), 8.2(2.99), 8.2(4), 8.3(0.12), 8.4(1)
Bug Id:
CSCtf69525
Title:
ASA Crashes with crafted TLS packet
Description:

Summary

Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities as follows:

* Three SunRPC Inspection Denial of Service Vulnerabilities
* Three Transport Layer Security (TLS) Denial of Service Vulnerabilities
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100804-asa.shtml.

Note: The Cisco Firewall Services Module (FWSM) is affected by the SunRPC DoS vulnerabilities. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the FWSM. This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20100804-fwsm.shtml.

Status:
Other
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2(2)
Known Fixed Releases:
Bug Id:
CSCuc60950
Title:
Traceback in snpi_divert with timeout floating-conn configured
Description:

Symptom:
Both ASA's running 8.2.5 and above are crashing on Dispatch Unit

Conditions:

ASAs running 8.2.5 and above

Workaround:

None at this time

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2(5.33)
Known Fixed Releases:
100.7(13.109), 100.7(6.105), 100.8(27.30), 100.8(34.1), 100.8(38.4), 100.8(50.12), 100.9(0.19), 100.9(4.1), 100.9(9.1), 8.2(5.39)
Bug Id:
CSCsy80705
Title:
ASA WebVPN HTTP server issue-XSS
Description:

Summary:

There is a vulnerability in the Cisco ASA due to insufficient restrictions on Rot13-encoded URL parameters utilized by the SSL VPN feature of the Cisco ASA when clients browse web pages by means of the VPN web portal. An attacker who could convince a user to visit a malicious page while logged into the secure portal could take advantage of the vulnerability to execute arbitrary script or HTML code within the security context of the affected site.

Public Intellishield Alert:

http://tools.cisco.com/security/center/viewAlert.x?alertId=18442

Workarounds:
No workarounds in the Cisco ASA exists. However, additional mitigation information for XSS attacks can be found at the following Applied Mitigation Bulletin (AMB): http://www.cisco.com/warp/public/707/cisco-amb-20060922-understanding-xss.shtml

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4)
Known Fixed Releases:
8.0(4.161), 8.0(4.215), 8.0(4.33), 8.0(5), 8.1(2.165), 8.1(2.24), 8.2(1.2), 8.2(4)
Bug Id:
CSCuq76847
Title:
ASA:Page fault traceback ACL FQDN Object-group
Description:

Symptom:
An ASA generated a traceback while updating an FQDN object group.

Conditions:
An ASA must reference FQDN ACLs

Workaround:
no known workaround at this time

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
100.12(10.30), 9.1(2.3), 9.2(1), 9.2(2.4)
Known Fixed Releases:
100.11(0.47), 100.12(0.51), 100.12(22.1), 100.12(6.7), 100.13(0.3), 100.13(12.5), 100.13(13.1), 100.13(14.3), 100.13(15.2), 100.13(16.1)
Bug Id:
CSCsy82260
Title:
ASA fails to redirect traffic to WCCP cache server
Description:

At certain occasions after a failure the ASA fails to redirect traffic on TCP ports 80 and
443 to the WCCP cache servers. This problem occurs at any time during the day. We have
observed that the problem always happens after a failure in the network that causes the
ASA to momentarily lose communicate with the WCCP servers. This can be a failure initiated on
the WCCP servers themselves or any connection devices between the ASA and the WCCP
servers. We have two (2) WCCP cache servers, if any one of these servers is brought down
for maintenance, we experience the problem as well. Traffic will not be redirected to the
remaining online server. The 1st thing we see on the ASA is log messages indicating
communication with web-cache server has been lost, as shown below:

Mar 06 2009 08:52:03: %ASA-1-332004: Web Cache 172.20.143.11/90 lost
Mar 06 2009 08:52:03: %ASA-1-332004: Web Cache 172.20.143.11/91 lost
Mar 06 2009 08:52:03: %ASA-1-332004: Web Cache 172.20.143.11/92 lost

The IP addresses for our web-cache servers are 172.20.143.11 and 172.20.143.12. When the
connection failure caused by what ever reason (outside of the ASA itself) is restore, no
traffic is redirected by the ASA. The show WCCP commands show everything is normal, it is
able to talk with the web-cache servers. The symptoms that were observed in
troubleshooting were that "show wccp 90 detail" on the ASA displayed redirected packet
counters that were not incrementing. All other WCCP diagnostics appeared normal
(Here I Am & I See You heartbeat packets were incrementing) on both the ASAs and the Blue
Coat proxies, and "show wccp 90" on the ASA indicated 1 WCCP router (the ASA) and 2 WCCP
caches (the Blue Coat proxies), as expected. User traffic will be reaching the internet
directly without redirection. We did not notice this problem until after upgrading the ASA
code to 8.1.2(11) code on 02/02/2009. The previous code were running prior to that was
8.1.2(7). The problem could have been there on the previous code but we just did not
notice it until we were running 8.1.2(11). Please note we do not see this problem at all
when the ASA itself fails or is reloaded. It always occurs when there is any other failure
which causes web-cache communication to be lost


Work around

The steps outlined below show how we resolve this issue when it happens.


1. Disable WCCP on Blue Coat proxy 1 and proxy 2.

2. Remove the WCCP commands on the ASA:

no wccp interface inside 90 redirect in
no wccp 90 redirect-list 101 password Bluecoat
no wccp 91 redirect-list 133 password Bluecoat
no wccp 92 redirect-list 134 password Bluecoat
no wccp 93 redirect-list 135 password Bluecoat
no wccp 94 redirect-list 136 password Bluecoat
no wccp 95 redirect-list 137 password Bluecoat
no wccp 96 redirect-list 138 password Bluecoat
no wccp 97 redirect-list 139 password Bluecoat

3. Reconfigure WCCP commands on the ASA:

wccp 90 redirect-list 101 password Bluecoat
wccp 91 redirect-list 133 password Bluecoat
wccp 92 redirect-list 134 password Bluecoat
wccp 93 redirect-list 135 password Bluecoat
wccp 94 redirect-list 136 password Bluecoat
wccp 95 redirect-list 137 password Bluecoat
wccp 96 redirect-list 138 password Bluecoat
wccp 97 redirect-list 139 password Bluecoat
wccp interface inside 90 redirect in


4. Enable WCCP on Blue Coat proxy 1 and proxy 2.


5. Observe that Here I Am & I See You heartbeat packets were incrementing on both the
ASAs and the Blue Coat proxies.


6. Observe that redirected packet counters were incrementing on the ASA.


7. Confirm from our PCs that web traffic was being redirected from the ASA to the Blue
Coat proxies for authentication and filtering.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.1(2.16), 8.1(2.19), 8.2(1)
Known Fixed Releases:
7.2(4.35), 8.0(4.34), 8.0(4.36), 8.1(2.25), 8.1(2.27), 8.2(1.10), 8.2(4), 8.3(0.0)
Bug Id:
CSCtf37506
Title:
TLS test tls10-hs-multiple with mutated packet causes ASA to traceback
Description:

Summary

Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities as follows:

* Three SunRPC Inspection Denial of Service Vulnerabilities
* Three Transport Layer Security (TLS) Denial of Service Vulnerabilities
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100804-asa.shtml.

Note: The Cisco Firewall Services Module (FWSM) is affected by the SunRPC DoS vulnerabilities. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the FWSM. This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20100804-fwsm.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
100.4(0.43), 8.2(2)
Known Fixed Releases:
100.5(5.15), 100.7(0.15), 100.7(6.1), 8.2(2.104), 8.2(2.17), 8.3(1.100), 8.3(1.6), 8.4(0.99), 8.4(1)
Bug Id:
CSCtf56740
Title:
Yahoo IM Inspection code deficiency
Description:

Symptom:
The Yahoo instant messaging inspection code has a deficiency that may lead to a denial of service condition.

Conditions:
Cisco ASA configured for Yahoo instant messaging inspection.

Note: The attack surface for this issue is very low.

Workaround:
Disable Yahoo IM inspection.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2
Known Fixed Releases:
100.4(0.54), 8.0(5.17), 8.1(2.45), 8.2(2.13), 8.2(2.99), 8.2(4), 8.3(1.100), 8.3(1.3), 8.4(1)
Bug Id:
CSCte15240
Title:
Port openssl DTLS fragment memory leak
Description:

Symptom:
Cisco ASA may experience a memory leak when receiving a specific sequence of DTLS messages.

Conditions:
Authentication is needed before this can take place.

Workaround:
None

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4), 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1)
Known Fixed Releases:
100.4(0.32), 8.0(5.7), 8.1(2.40), 8.2(2.1), 8.2(2.99), 8.2(4), 8.3(0.19), 8.3(1)
Bug Id:
CSCsx37414
Title:
DA: Acct-disable-override:User can login with bad secondary credentials
Description:

Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. This security advisory outlines the details of these vulnerabilities:

* VPN Authentication Bypass when Account Override Feature is Used vulnerability
* Crafted HTTP packet denial of service (DoS) vulnerability
* Crafted TCP Packet DoS vulnerability
* Crafted H.323 packet DoS vulnerability
* SQL*Net packet DoS vulnerability
* Access control list (ACL) bypass vulnerability

Workarounds are available for some of the vulnerabilities.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtml

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2
Known Fixed Releases:
100.3(0.2), 100.4(0.2), 8.2(0.211), 8.2(1), 8.2(4)
Bug Id:
CSCtb37219
Title:
Traceback in Dispatch Unit AIP-SSM Inline and nailed option on static
Description:

Summary: Cisco ASA 5500 Series Adaptive Security Appliances are affected by the following vulnerabilities:

* TCP Connection Exhaustion Denial of Service Vulnerability
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerabilities
* Skinny Client Control Protocol (SCCP) Inspection Denial of Service Vulnerability
* WebVPN Datagram Transport Layer Security (DTLS) Denial of Service Vulnerability
* Crafted TCP Segment Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability
* NT LAN Manager version 1 (NTLMv1) Authentication Bypass Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

Cisco has released free software updates that address these vulnerabilities.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml.


Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
7.0, 7.1, 7.2, 8.0(4.32)
Known Fixed Releases:
8.0(4.100), 8.0(4.44), 8.1(2.35), 8.2(1.10), 8.2(1.100), 8.2(1.102), 8.2(4), 8.3(0.0)
Bug Id:
CSCuv05813
Title:
ASA does not honor custom-defined TCP MSS
Description:

Symptom:
Admin changes the ASA TCP MSS via the command <>". However, the ASA still continues to negotiate TCP use the default MSS of 1460

Conditions:
-Configure a non-default MSS, such as "sysopt connection tcpmss 1000"
-Send a TCP SYN to the ASA
-The ASA will reply with the default MSS of 1460, not the customer value of 1000
-This problem has been seen on ASA 9.1.5.21, and 9.1.6.6

Workaround:
None.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
9.1(6.6)
Known Fixed Releases:
Bug Id:
CSCta56639
Title:
ASA5580: Traceback in Thread Name: DATAPATH-2-604 due to SIP
Description:

Symptom:
Cisco ASA 5580 may experience a crash in rare circumstances with software version 8.1.2(23). This is experienced after receiving a series of SIP messages.

Note: The crash is no longer experienced after the customer moved to 8.1.2(29).

Conditions:
Cisco ASA 5580 running software version 8.1.2(23) and configured for SIP inspection.

Workaround:
The crash is no longer experienced on software release 8.1.2(29) or later.

Status:
Terminated
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.1(2.23)
Known Fixed Releases:
Bug Id:
CSCtg47237
Title:
ASA traceback under Nessus scanning
Description:

<B>Symptom:</B>
Crash under scan

<B>Conditions:</B>
ASA undergone a scanning done by Nessus network scanning program.

<B>Workaround:</B>
None at the moment

Status:
Terminated
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2(1.10)
Known Fixed Releases:
Bug Id:
CSCtb64913
Title:
WEBVPN: page fault in thread name dispath unit, eip udpmod_user_put
Description:

Summary: Cisco ASA 5500 Series Adaptive Security Appliances are affected by the following vulnerabilities:

* TCP Connection Exhaustion Denial of Service Vulnerability
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerabilities
* Skinny Client Control Protocol (SCCP) Inspection Denial of Service Vulnerability
* WebVPN Datagram Transport Layer Security (DTLS) Denial of Service Vulnerability
* Crafted TCP Segment Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability
* NT LAN Manager version 1 (NTLMv1) Authentication Bypass Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

Cisco has released free software updates that address these vulnerabilities.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml.


Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4.29), 8.0(4.32)
Known Fixed Releases:
8.0(4.100), 8.0(4.44), 8.1(2.35), 8.2(1.10), 8.2(1.100), 8.2(1.102), 8.2(4), 8.3(0.0)
Bug Id:
CSCub08224
Title:
ASA 210005 and 210007 LU allocate xlate/conn failed with simple 1-1 NAT
Description:

Symptom:

Connections and xlates may not be replicated to Standby unit with:

%ASA-3-210005: LU allocate connection failed
%ASA-3-210007: LU allocate xlate failed

Conditions:

This was observed on ASA5585 8.4(3.9) with the simplest NAT setup:

object network subscribers
subnet 10.128.0.0 255.248.0.0

object network pool_prod_64K
range 192.168.0.1 192.168.255.254

object-group network public_ip
network-object object pool_prod_64K

object network subscribers
nat (inside,outside) dynamic public_ip

Workaround:

None.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.4(3.9)
Known Fixed Releases:
100.7(13.109), 100.7(6.105), 100.8(27.26), 100.8(34.1), 100.8(38.4), 100.8(50.7), 100.9(0.13), 100.9(4.1), 8.4(5.4), 8.4(5.99)
Bug Id:
CSCsz06748
Title:
ASA traceback in inspect Skinny
Description:

Symptoms:
Cisco ASA may experience a reload when receiving malformed Skinny packets. The perceived malformed packet may actually be a valid SCCPv17 message.

Condition:
The issue was happened in client-mode Ezvpn situation.The client is IOS device and the server is ASA. As soon as an SCCPv17 phone try to Registering on CM. This issue is only experienced when inspect skinny is enabled.


Workaround:
1. Disable Skinny inspection
or
2. downgrade phone to a phone load version that supports an SCCP version earlier than SCCPv17, basically any phone load 8.3 or lower. Note this is only a temporary workaround.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4), 8.0(4.27), 8.0(4.29)
Known Fixed Releases:
100.3(0.2), 8.0(4.161), 8.0(4.33), 8.0(5), 8.1(2.165), 8.1(2.24), 8.2(1.2), 8.2(4)
Bug Id:
CSCtf56704
Title:
MSN Instant Messaging Inspection Issue
Description:

Symptom:
The MSN instant messaging inspection code has a deficiency that may lead to a denial of service condition.

Conditions:
Cisco ASA configured for MSN instant messaging inspection.

Note: The attack surface for this issue is very low.

Workaround:
Disable MSN IM inspection.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2
Known Fixed Releases:
100.7(0.1), 8.0(5.17), 8.1(2.45), 8.2(2.13), 8.2(2.99), 8.2(4), 8.3(1.100), 8.3(1.3), 8.4(0.99), 8.4(1)
Bug Id:
CSCtf55259
Title:
AAA : Traceback on authenticating a https user
Description:

Summary

Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities as follows:

* Three SunRPC Inspection Denial of Service Vulnerabilities
* Three Transport Layer Security (TLS) Denial of Service Vulnerabilities
* Session Initiation Protocol (SIP) Inspection Denial of Service Vulnerability
* Crafted Internet Key Exchange (IKE) Message Denial of Service Vulnerability

These vulnerabilities are not interdependent; a release that is affected by one vulnerability is not necessarily affected by the others.

There are workarounds for some of the vulnerabilities disclosed in this advisory.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100804-asa.shtml.

Note: The Cisco Firewall Services Module (FWSM) is affected by the SunRPC DoS vulnerabilities. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the FWSM. This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20100804-fwsm.shtml.

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
100.4(0.43), 8.0(5.12)
Known Fixed Releases:
100.7(2.1), 8.0(5.13), 8.1(2.42), 8.2(2.8), 8.2(2.99), 8.2(4), 8.3(1.1), 8.3(1.100), 8.4(1)
Bug Id:
CSCup37416
Title:
Stale VPN Context entries cause ASA to stop encrypting traffic
Description:

Symptom:
ASAs which had a working L2L VPN tunnel suddenly stops encrypting traffic.

Conditions:
n/a

Workaround:
This issue may be prevented by disabling data-based rekeying. If the problem still occurs without data-based rekeying, failover to the backup ASA or reboot the ASA

Further Problem Description:

Status:
Open
Severity:
1 Catastrophic
Last Modified:
30-JUN-2015
Known Affected Releases:
9.1(2.8), 9.1(3), 9.1(5.12), 9.1(6), 9.2(3)
Known Fixed Releases:
Bug Id:
CSCus49034
Title:
Tunnel default gateway no longer works in 9.3.2
Description:

Symptom:Connectivity via tunnel default gateway no longer works.

Conditions:ASA running 9.3.2.

Workaround:A static route from the IP addresses assigned to clients to the tunnel default gateway device must be added.


More Info:


Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
100.14(1.1), 9.3(2)
Known Fixed Releases:
100.12(0.112), 100.13(0.26), 100.13(19.9), 100.13(20.10), 100.13(21.7), 100.14(0.3), 100.14(1.2), 100.14(10.3), 100.14(11.3), 100.14(2.3)
Bug Id:
CSCuc16455
Title:
ASA packet transmission failure due to depletion of 1550 byte block
Description:

Symptom:
Cisco Adaptive Security Appliance runs out 1550 byte block and it do not free it.

In general, block depletion of 1550 bytes can result in the ASA being unable to generate packets. This will cause traffic disruptions and failover problems.

Conditions:
Configure Lan-to-Lan IPSec VPN and traffic path through it.

Workaround:
There is no known workaround at this point.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.4(4.5), 8.4(4.9), 9.0(1), 9.1(1)
Known Fixed Releases:
100.7(13.103), 100.7(6.104), 100.8(0.241), 100.8(11.41), 100.8(27.20), 100.8(33.26), 100.8(34.1), 100.8(38.1), 100.8(39.1), 100.9(0.6)
Bug Id:
CSCsy80694
Title:
ASA's DOM wrapper issue- Clientless XSS
Description:

Summary:

There is a vulnerability in the Cisco ASA due to insufficient restrictions on access to the JavaScript-based Document Object Model (DOM) that the SSL VPN feature of Cisco ASA uses when clients browse web pages using the VPN web portal. If an unauthenticated, remote attacker can convince a user to visit a malicious page while the user is logged in to the secure portal, the attacker could use this vulnerability to execute arbitrary script or HTML code in the security context of the affected site.

Workarounds:
No workarounds in the Cisco ASA exists. However, additional mitigation information for XSS attacks can be found at the following Applied Mitigation Bulletin (AMB): http://www.cisco.com/warp/public/707/cisco-amb-20060922-understanding-xss.shtml

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.0(4)
Known Fixed Releases:
8.0(4.161), 8.0(4.215), 8.0(4.33), 8.0(5), 8.1(2.165), 8.1(2.24), 8.2(1.2), 8.2(4)
Bug Id:
CSCuu38315
Title:
ASA Cluster member traceback in DATAPATH
Description:

Symptom:
ASA 5585-20 cluster member running 9.4.1 traceback in DATAPATH

Conditions:
ASA 5585-20 running 9.4.1 in cluster mode.

Workaround:
No known workarounds.

Further Problem Description:

Status:
Other
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
9.4(1)
Known Fixed Releases:
Bug Id:
CSCuo45321
Title:
ASA allows IKEv1 clients to bypass address assignment, causing conflict
Description:

Symptom:
ASA allows some non-cisco ikev1 clients to use an assigned IP without going through address assignment. This means that the used IP is not marked as in-use in the address pool, which means that it may be assigned to another client that does go through address assignment. In this case, the conflict is resolved by kicking out the oldest IKEv1 session using that IP.

Additionally, the ASA doesn't check that the client actually opens a tunnel matching it's assigned address. This can lead to the same conflict mentioned above.

Conditions:
Mixture of cisco and non-cisco ikev1 clients in use

Non-Cisco IKEv1 client uses assigned address without going through address assignment, or ignores address assignment result.

Workaround:
Stop using non-cisco ikev1 clients that exhibit this behavior.

This can be enforced on the ASA using the "client-access-rule" feature inside a group-policy. For example, the following config snippit:

client-access-rule 1 permit type * version 5*
client-access-rule 2 deny type * version *

will only allow Cisco clients with a version number higher than 5.0.0 to connect to the tunnel-group with this group-policy.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.2(5.46)
Known Fixed Releases:
100.11(0.46), 100.12(0.46), 100.12(10.47), 100.12(6.7), 100.13(0.2), 100.13(11.1), 100.13(12.1), 100.13(13.1), 100.13(14.1), 100.13(15.1)
Bug Id:
CSCui38495
Title:
ASA Assert in Checkheaps chunk create internal
Description:

Symptom:
After upgrading to 8.4(5) the ASA has seen several reboots

Conditions:
Cisco Adaptive Security Appliance Software Version 8.4(5)
Device Manager Version 6.4(1)

Workaround:
N/A

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
8.4(5)
Known Fixed Releases:
100.10(0.12), 100.10(1.10), 100.10(2.1), 100.7(6.122), 100.8(27.91), 100.8(38.32), 100.8(40.21), 100.8(41.2), 100.8(45.1), 100.8(46.1)

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论