漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability in the TCP normalizer of Cisco Adaptive Security Appliance (ASA) Software (8.0 through 8.7 and 9.0 through 9.6) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause Cisco ASA and FTD to drop any further incoming traffic on all interfaces, resulting in a denial of service (DoS) condition. The vulnerability is due to improper limitation of the global out-of-order TCP queue for specific block sizes. An attacker could exploit this vulnerability by sending a large number of unique permitted TCP connections with out-of-order segments. An exploit could allow the attacker to exhaust available blocks in the global out-of-order TCP queue, causing the dropping of any further incoming traffic on all interfaces and resulting in a DoS condition. Cisco Bug IDs: CSCvb46321.
漏洞信息
N/A
漏洞
资源管理错误
漏洞
Cisco Adaptive Security Appliances Software和Cisco Firepower Threat Defense Software 安全漏洞
漏洞信息
Cisco Adaptive Security Appliances(ASA,自适应安全设备)Software和Cisco Firepower Threat Defense(FTD)Software都是由美国思科(Cisco)公司开发的程序。前者是一套运行于防火墙中的操作系统。后者是一套提供下一代防火墙服务的统一软件。 Cisco ASA Software 8.0至8.7版本和9.0至9.6版本和Cisco FTD Software中的TCP normalizer中存在安全漏洞。远程攻击者可利用该漏洞造成
漏洞信息
N/A
漏洞
N/A