Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.
The product does not handle or incorrectly handles when a particular element is not the expected type, e.g. it expects a digit (0-9) but is provided with a letter (A-Z).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firepower_threat_defense | Cisco | 6.4.0 (including) | 6.4.0.13 (excluding) |
Firepower_threat_defense | Cisco | 6.6.0 (including) | 6.6.5.1 (excluding) |
Firepower_threat_defense | Cisco | 6.7.0 (including) | 6.7.0.3 (excluding) |
Firepower_threat_defense | Cisco | 7.0.0 (including) | 7.0.1 (excluding) |
Secure_firewall_management_center | Cisco | 3.1.0.1 (including) | 3.1.0.1 (including) |