A vulnerability in the SIP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a crash and reload of an affected device, resulting in a denial of service (DoS) condition.The vulnerability is due to a crash that occurs during a hash lookup for a SIP pinhole connection. An attacker could exploit this vulnerability by sending crafted SIP traffic through an affected device. A successful exploit could allow the attacker to cause a crash and reload of the affected device.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firepower_threat_defense | Cisco | 6.2.2 (including) | 6.4.0.12 (excluding) |
Firepower_threat_defense | Cisco | 6.5.0 (including) | 6.6.4 (excluding) |
Firepower_threat_defense | Cisco | 6.7.0 (including) | 6.7.0.2 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.8 (including) | 9.8.4.34 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.9 (including) | 9.9.2.85 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.10 (including) | 9.12.4.18 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.13 (including) | 9.13.1.21 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.14 (including) | 9.14.2.13 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.15 (including) | 9.15.1.15 (excluding) |