漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability in the internal packet-processing functionality of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to the affected software improperly validating IP Version 4 (IPv4) and IP Version 6 (IPv6) packets after the software reassembles the packets (following IP Fragmentation). An attacker could exploit this vulnerability by sending a series of malicious, fragmented IPv4 or IPv6 packets to an affected device. A successful exploit could allow the attacker to cause Snort processes on the affected device to hang at 100% CPU utilization, which could cause the device to stop processing traffic and result in a DoS condition until the device is reloaded manually. This vulnerability affects Cisco Firepower Threat Defense (FTD) Software Releases 6.2.1 and 6.2.2, if the software is running on a Cisco Firepower 2100 Series Security Appliance. Cisco Bug IDs: CSCvf91098.
漏洞信息
N/A
漏洞
未加控制的资源消耗(资源穷尽)
漏洞
Cisco Firepower 2100 Series Security Appliances Firepower Threat Defense Software 安全漏洞
漏洞信息
Cisco Firepower 2100 Series Security Appliances是美国思科(Cisco)公司的一款2100系列的安全防火墙设备。Firepower Threat Defense(FTD)Software是运行在其中的一套防火墙操作系统。 Cisco Firepower 2100 Series Security Appliances中的FTD Software 6.2.1版本和6.2.2版本的内部数据包处理功能存在安全漏洞,该漏洞源于在软件重新组装数据包之后,程序没有正确的校验
漏洞信息
N/A
漏洞
N/A