CVE编号
CVE-2018-15454利用情况
暂无补丁情况
N/A披露时间
2018-11-02漏洞描述
思科自适应安全设备(ASA)软件和思科Firepower威胁防御(FTD)软件的会话初始协议(SIP)检查引擎中的漏洞可能允许未经身份验证的远程攻击者导致受影响的设备重新加载或触发高CPU使用率,从而导致处于拒绝服务(DoS)状态。该漏洞是由于SIP流量处理不当所致。攻击者可以通过在受影响的设备上发送旨在专门触发此问题的SIP请求来利用此漏洞。解决此漏洞的软件更新尚不可用。解决建议
目前没有详细的解决方案提供:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181031-asaftd-sip-dos
参考链接 |
|
---|---|
http://www.securityfocus.com/bid/105768 | |
http://www.securitytracker.com/id/1042129 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * |
From (including) 9.10 |
Up to (excluding) 9.10.1.2 |
||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * |
From (including) 9.4 |
Up to (excluding) 9.4.4.27 |
||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * |
From (including) 9.6 |
Up to (excluding) 9.6.4.18 |
||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * |
From (including) 9.8 |
Up to (excluding) 9.8.3.16 |
||||
运行在以下环境 | |||||||||
应用 | cisco | adaptive_security_appliance_software | * |
From (including) 9.9 |
Up to (excluding) 9.9.2.32 |
||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * |
From (including) 6.1.0 |
Up to (excluding) 6.1.0.7 |
||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * |
From (including) 6.2.0 |
Up to (excluding) 6.2.0.6 |
||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * |
From (including) 6.2.2 |
Up to (excluding) 6.2.2.4 |
||||
运行在以下环境 | |||||||||
应用 | cisco | firepower_threat_defense | * |
From (including) 6.2.3 |
Up to (excluding) 6.2.3.7 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...