Vigil@nce - Cisco Adaptive Security Appliance: denial of service via OSPFv2
September 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can send a specially crafted OSPFv2 packet to a device
running Cisco Adaptive Security Appliance Software, in order to
trigger a denial of service.
– Impacted products: ASA.
– Severity: 2/4.
– Creation date: 08/07/2015.
DESCRIPTION OF THE VULNERABILITY
The Cisco Adaptive Security Appliance product implements the
routing prototol OSPF version 2.
However, the server process does not handle some kinds of error in
the packet format. When a packet matching one of these special
cases is received, a fatal error occurs. This leads to device halt
then device restart.
This vulverabiliry looks very like the one described in
VIGILANCE-VUL-17301. (The two Cisco announces are almost word as
word identical.)
An attacker can therefore send a specially crafted OSPFv2 packet
to a device running Cisco Adaptive Security Appliance Software, in
order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN