A vulnerability in the TCP proxy functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper handling of TCP flows. An attacker could exploit this vulnerability by sending a crafted stream of TCP traffic through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firepower_threat_defense | Cisco | * | 6.4.0.15 (excluding) |
Firepower_threat_defense | Cisco | 6.5.0 (including) | 6.6.5.2 (excluding) |
Firepower_threat_defense | Cisco | 7.0.0 (including) | 7.0.2 (excluding) |
Firepower_threat_defense | Cisco | 7.1.0 (including) | 7.1.0 (including) |