[c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability

Alexander Bochmann ab at lists.gxis.de
Tue Feb 16 01:50:43 EST 2016

...on Mon, Feb 15, 2016 at 07:50:36PM +0100, Peter Rathlev wrote:
 > On Wed, 2016-02-10 at 08:06 -0800, psirt at cisco.com wrote:
 > > Advisory ID: cisco-sa-20160210-asa-ike
 > Poor bastards stuck at 8.2 (like us) might be relieved to know that
 > there actually is a 8.2(5)59 version with the fix. Reading the SA page
 > I got the impression that there was no fixed software for 8.2(5).

Oh wow, now that's massively annoying... Adding that little piece 
of information to the advisory would have saved us from a quite a 
bit of rather troublesome emergency migration work this weekend.

I also think it's somewhat surprising how little buzz this creates, 
for a remote shell exploit in one of the major firewall systems, 
as detailed in https://blog.exodusintel.com/2016/02/10/firewall-hacking/

Is everyone waiting for a Metasploit module to show up?


More information about the cisco-nsp mailing list