Vigil@nce - Cisco Adaptive Security Appliance: denial of service via OSPFv2
September 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can send a specially crafted OSPFv2 packet to a device running Cisco Adaptive Security Appliance Software, in order to trigger a denial of service.
Impacted products: ASA.
Creation date: 08/07/2015.
DESCRIPTION OF THE VULNERABILITY
The Cisco Adaptive Security Appliance product implements the routing prototol OSPF version 2.
However, the server process does not handle some kinds of error in the packet format. When a packet matching one of these special cases is received, a fatal error occurs. This leads to device halt then device restart.
This vulverabiliry looks very like the one described in VIGILANCE-VUL-17301. (The two Cisco announces are almost word as word identical.)
An attacker can therefore send a specially crafted OSPFv2 packet to a device running Cisco Adaptive Security Appliance Software, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN