A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firepower_threat_defense | Cisco | 6.4.0 (including) | 6.4.0.13 (excluding) |
Firepower_threat_defense | Cisco | 6.6.0 (including) | 6.6.5 (excluding) |
Firepower_threat_defense | Cisco | 6.7.0 (including) | 6.7.0.3 (excluding) |
Firepower_threat_defense | Cisco | 7.0.0 (including) | 7.0.1 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.8.0 (including) | 9.8.4.40 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.12.0 (including) | 9.12.4.29 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.14.0 (including) | 9.14.3.9 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.15.0 (including) | 9.15.1.17 (excluding) |
Adaptive_security_appliance_software | Cisco | 9.16.0 (including) | 9.16.2.3 (excluding) |