
====================================================================

                           CERT-Renater

               Note d'Information No. 2015/VULN133
_____________________________________________________________________

DATE                : 09/07/2015

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Cisco ASA Software.

======================================================================
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa
______________________________________________________________________

Multiple Vulnerabilities in Cisco ASA Software

Advisory ID: cisco-sa-20141008-asa
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa

Revision 3.0

Last Updated  2015 July 8 21:04  UTC (GMT)

For Public Release 2014 October 8 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

Cisco Adaptive Security Appliance (ASA) Software is affected by the
following vulnerabilities:

    Cisco ASA SQL*NET Inspection Engine Denial of Service Vulnerability
    Cisco ASA VPN Denial of Service Vulnerability
    Cisco ASA IKEv2 Denial of Service Vulnerability
    Cisco ASA Health and Performance Monitor Denial of Service
     Vulnerability
    Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of
     Service Vulnerability
    Cisco ASA SunRPC Inspection Engine Denial of Service Vulnerability
    Cisco ASA DNS Inspection Engine Denial of Service Vulnerability
    Cisco ASA VPN Failover Command Injection Vulnerability
    Cisco ASA VNMC Command Input Validation Vulnerability
    Cisco ASA Local Path Inclusion Vulnerability
    Cisco ASA Clientless SSL VPN Information Disclosure and Denial of
     Service Vulnerability
    Cisco ASA Clientless SSL VPN Portal Customization Integrity
     Vulnerability
    Cisco ASA Smart Call Home Digital Certificate Validation
     Vulnerability

These vulnerabilities are independent of one another; a release that is
affected by one of the vulnerabilities may not be affected by the
others.

Successful exploitation of the Cisco ASA SQL*NET Inspection Engine
Denial of Service Vulnerability, Cisco ASA VPN Denial of Service
Vulnerability, Cisco ASA IKEv2 Denial of Service Vulnerability, Cisco
ASA Health and Performance Monitor Denial of Service Vulnerability,
Cisco ASA GPRS Tunneling Protocol Inspection Engine Denial of Service
Vulnerability, Cisco ASA SunRPC Inspection Engine Denial of Service
Vulnerability, and Cisco ASA DNS Inspection Engine Denial of Service
Vulnerability may result in a reload of an affected device, leading to
a denial of service (DoS) condition.

Successful exploitation of the Cisco ASA VPN Failover Command Injection
Vulnerability, Cisco ASA VNMC Command Input Validation Vulnerability,
and Cisco ASA Local Path Inclusion Vulnerability may result in full
compromise of the affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Information
Disclosure and Denial of Service Vulnerability may result in the
disclosure of internal information or, in some cases, a reload of the
affected system.

Successful exploitation of the Cisco ASA Clientless SSL VPN Portal
Customization Integrity Vulnerability may result in a compromise of the
Clientless SSL VPN portal, which may lead to several types of attacks,
which are not limited to cross-site scripting (XSS), stealing of
credentials, or redirects of users to malicious web pages.

Successful exploitation of the Cisco ASA Smart Call Home Digital
Certificate Validation Vulnerability may result in a digital
certificate validation bypass, which could allow the attacker to bypass
digital certificate authentication and gain access inside the network
via remote access VPN or management access to the affected system via
the Cisco Adaptive Security Device Management (ASDM).


2015-July-08 UPDATE: Cisco PSIRT is aware of disruption to some Cisco
customers with Cisco ASA devices affected by CVE-2014-3383, the Cisco
ASA VPN Denial of Service Vulnerability that was disclosed in this
Security Advisory. Traffic causing the disruption was isolated to a
specific source IPv4 address. Cisco has engaged the provider and owner
of that device and determined that the traffic was sent with no
malicious intent. Cisco strongly recommends that customers upgrade to a
fixed Cisco ASA software release to remediate this issue.

Cisco has released free software updates that address these
vulnerabilities. Workarounds that mitigate some of these
vulnerabilities are available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa


=========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================
