Thread-topic: [SA17553] Cisco ISAKMP IKE Message Processing Denial of Service
>
>
> TITLE:
> Cisco ISAKMP IKE Message Processing Denial of Service
>
> SECUNIA ADVISORY ID:
> SA17553
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> DoS
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> Cisco SAN-OS 1.x (MDS 9000 Switches)
>
> Cisco PIX 7.x
>
> Cisco PIX 6.x
>
> Cisco PIX 5.x
>
> Cisco PIX 4.x
>
> Cisco IOS R12.x
>
> Cisco IOS 12.x
>
> Cisco SAN-OS 2.x (MDS 9000 Switches)
>
> Cisco VPN 3000 Concentrator
>
>
> SOFTWARE:
> Cisco Firewall Services Module (FWSM) 2.x
>
> Cisco Firewall Services Module (FWSM) 1.x
>
>
> DESCRIPTION:
> A vulnerability has been reported in various Cisco products, which
> can be exploited by malicious people to cause a DoS (Denial of
> Service).
>
> The vulnerability is caused due to errors in the processing of IKEv1
> Phase 1 protocol exchange messages. This can be exploited to cause a
> DoS.
>
> The vulnerability has been reported in the following products.
> * Cisco IOS versions based on 12.2SXD, 12.3T, 12.4 and 12.4T
> * Cisco PIX Firewall versions up to but not including 6.3(5)
> * Cisco PIX Firewall/ASA versions up to but not including 7.0.1.4
> * Cisco Firewall Services Module (FWSM) versions up to but not
> including 2.3(3)
> * Cisco VPN 3000 Series Concentrators versions up to but not
> including 4.1(7)H and 4.7(2)B
> * Cisco MDS Series SanOS versions up to but not including 2.1(2)
>
> Note: For Cisco IOS, only images that contain the Crypto Feature Set
> are vulnerable.
>
> SOLUTION:
> See patch matrix in vendor advisory for information about fixes.
>
> html#software
>
> PROVIDED AND/OR DISCOVERED BY:
> Oulu University Secure Programming Group (OUSPG) .
>
> ORIGINAL ADVISORY:
>
>
> ----------------------------------------------------------------------