Cisco ASA Software Multiple Vulnerabilities (cisco-sa-20131009-asa)

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

The remote Cisco ASA device is affected by one or more of the
following vulnerabilities :

- A denial of service vulnerability exists due to improper
clearing of unused memory blocks after an AnyConnect SSL
VPN client disconnects. (CVE-2013-3415)

- A denial of service vulnerability exists resulting from
an error in the code that decrypts packets transiting an
active VPN tunnel. (CVE-2013-5507)

- A denial of service vulnerability exists due to improper
handling of segmented Transparent Network Substrate
(TNS) packets. (CVE-2013-5508)

- An authentication bypass vulnerability exists resulting
due to an error in handling a client crafted certificate
during the authentication phase. (CVE-2013-5509)

- An authentication bypass vulnerability exists due to
improper parsing of the LDAP response packet received
from a remote AAA LDAP server. (CVE-2013-5510)

- An authentication bypass vulnerability exists due to an
error in the implementation of the
authentication-certificate option. (CVE-2013-5511)

- A denial of service vulnerability exists due to improper
handling of a race condition during inspection of HTTP
packets by the HTTP DPI engine. (CVE-2013-5512)

- A denial of service vulnerability exists due to the
improper processing of unsupported DNS over TCP packets
by the DNS inspection engine. (CVE-2013-5513)

- A denial of service vulnerability exists resulting from
the improper handling of crafted HTTPS requests for
systems configured for Clientless SSL VPN.
(CVE-2013-5515)

- A denial of service condition can be caused by improper
handling of crafted ICMP packets. (CVE-2013-5542)

Note that the verification checks for the presence of CVE-2013-5513
and CVE-2013-5515 are best effort approaches and may result in
potential false positives.

See also :

http://www.nessus.org/u?03a428f7
http://www.nessus.org/u?e290b3ad
http://www.nessus.org/u?255c2bd8
http://www.nessus.org/u?5c310e2c
http://www.nessus.org/u?51062d03
http://www.nessus.org/u?bfcbecc4
http://www.nessus.org/u?14a2e479
http://www.nessus.org/u?e9ce8c3b
http://www.nessus.org/u?b1afee31
http://www.nessus.org/u?a8ef1aa0

Solution :

Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20131009-asa.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true