Multiple Vulnerabilities in Cisco ASA Software (cisco-sa-20131009-asa)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

The remote Cisco ASA device is affected by one or more of the
following vulnerabilities:

- A Denial of Service (DoS) vulnerability exists
resulting from improperly clearing unused memory blocks
after an AnyConnect SSL VPN client disconnects.
(CVE-2013-3415)

- A DoS vulnerability exists resulting from an error in
the code that decrypts packets transiting an active VPN
tunnel. (CVE-2013-5507)

- A DoS vulnerability exists resulting from improper
handling of segmented Transparent Network Substrate
(TNS) packets. (CVE-2013-5508)

- An authentication bypass vulnerability exists resulting
from an error in handling a client crafted certificate
during the authentication phase. (CVE-2013-5509)

- An authentication bypass vulnerability exists resulting
from the improper parsing of the LDAP response packet
received from a remote AAA LDAP server. (CVE-2013-5510)

- An authentication bypass vulnerability exists resulting
from an error in the implementation of the
authentication-certificate option. (CVE-2013-5511)

- A DoS vulnerability exists resulting from the improper
handling of a race condition during inspection of HTTP
packets by the HTTP DPI engine. (CVE-2013-5512)

- A DoS vulnerability exists resulting from the improper
processing of unsupported DNS over TCP packets by the
DNS inspection engine. (CVE-2013-5513)

- A DoS vulnerability exists resulting from the improper
handling of crafted HTTPS requests for systems
configured for Clientless SSL VPN. (CVE-2013-5515)

- A DoS condition can be caused by improper handling of
crafted ICMP packets. (CVE-2013-5542)

It should be noted that the verification checks for the presence of
CVE-2013-5513 and CVE-2013-5515 are best effort approaches and may
result in potential false positives.

See also :

http://www.nessus.org/u?03a428f7
http://www.nessus.org/u?e290b3ad
http://www.nessus.org/u?255c2bd8
http://www.nessus.org/u?5c310e2c
http://www.nessus.org/u?51062d03
http://www.nessus.org/u?bfcbecc4
http://www.nessus.org/u?14a2e479
http://www.nessus.org/u?e9ce8c3b
http://www.nessus.org/u?b1afee31
http://www.nessus.org/u?a8ef1aa0

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20131009-asa.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true