Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/92521 | vdb entry not applicable broken link third party advisory |
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip | broken link exploit |
http://blogs.cisco.com/security/shadow-brokers | vendor advisory press/media coverage exploit |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp | vendor advisory |
http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516 | vendor advisory |
https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html | exploit technical description |
https://www.exploit-db.com/exploits/40258/ | third party advisory vdb entry exploit |
http://www.securitytracker.com/id/1036637 | broken link third party advisory vdb entry |