Cisco发布了安全公告以应对发现于Cisco ASA (Adaptive Security Appliance)软件及FTD (Firepower Threat Defense)软件中的多个漏洞。攻击者可以向受影响系统发出特制的指令、封包、传送流(traffic stream)或档案从而攻击这些漏洞。
运行受影响ASA软件或FTB软件的Cisco产品,包括:
以上仅为一些受影响系统的例子而并不包括所有受影响的产。有关受影响系统:的详细资料,请参阅供应商网站的相应安全公告中有关“Affected Products”的部分。
用户可联络其产品支援供应商,以取得修补程式及有关支援。
成功利用这些漏洞可以导致在受影响系统绕过保安措施、权限提升、服务受阻断或重启受影响的系统。
适用于受影响系统的软件更新已可获取。受影响系统的用户应遵从产品供应商的建议,立即采取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software” 的部分。
用户可联络其产品支援供应商,以取得修补程式及有关支援。
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-acl-bypass
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-dma-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-ipsec-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-asa-syslog-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-cmd-injection
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-smb-snort
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ftd-inspect-dos
https://www.hkcert.org/my_url/zh/alert/18100401
https://www.us-cert.gov/ncas/current-activity/2018/10/03/Cisco-Releases-Security-Updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15399