-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Reference: CERT-EU Security Advisory 2014-017
 
Title: Cisco Firewall Services Module Cut-Through Proxy Denial of Service Vulnerability  [1]
 
Version history:
19.02.2014 Initial publication

Summary
=======

Cisco Firewall Services Module (FWSM) Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected system.

CVE numbers: CVE-2014-0710


Vulnerable systems
==================

Cisco FWSM Software for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers


Original Details
================

The vulnerability is due to a race condition when releasing the memory allocated by the cut-through proxy function. An attacker could exploit this vulnerability by sending traffic to match the condition that triggers cut-through proxy authentication.


What can you do?
================
There is a patch. [1]

What to tell your users?
========================
N/A

More information
================

[1] http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140219-fwsm


Best regards,
CERT-EU (http://cert.europa.eu)
Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu<mailto:cert-eu@ec.europa.eu>
PGP KeyID 0x46AC4383
FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQIcBAEBAgAGBQJTBjJ+AAoJEPpzpNLI8SVo0gYP/25/1YZZl6Ybl8HIhiZMasXQ
gUfH3lBH00w2HjvMBvdpCbSn6WnZeUUU1DBTYr4cE6cFsmfuvrw0ikopSeqiA9A8
CL1GtrK2HazBJl0inLXga/t2v6PmtC3x/e/88uwFDEZZWaUSZjLJJdz289iekCFx
+Pwude34zhDHGV3gLNMpCpAQcgSo38EGuES+DKYqBim51Ol2F195T3PDIMiJI8u1
ZFW+thHYRJWy2ywYwLd1eyPqdFMMc5AHO314GnJS0o4uVALYUJFDztile8phlJ2E
tMhKScWf6jkvDh3OZ3IUYAel/4z3yRvJeSP+kYnXx8KjHfH0I+yMYS8lUqvmkdk9
6h+0C04X4LmNyQJ1CvGsQl2H71+OyugBWHmQHkxwpy25nEihID+Vletr6zf8i5Vn
A9SKPnQl30q2i2tKRPpIQU617og/jv4NDjmrmland+Ib7yPQBnPnXHamxAb4mgl3
qigEtmeBB0DQdW3f1IFnSthwHY2Wal2feRrp+D/+ocrSkxSrfALJ/I6gAYRArP2L
lIp2SJqYDMZ++w7KUiy8ZQdWXqmxOQ7rXAJGDPdRZWVIqGSE33/KF1kWJFDlGtvs
dGczSC+qnGn4Fw5sWlbzeujh2AzhprZ1qHfZbaTxj50E7CvXXcIb2dZbXyW5wTKg
CsNfX9a8gHQzVA9o9KWa
=uhgn
-----END PGP SIGNATURE-----