|Title:||Cisco Firepower Detection Engine Pragmatic General Multicast Protocol Decoding Denial of Service Vulnerability|
|Summary:||A vulnerability in the detection engine parsing of Pragmatic General;Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote;attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting.|
A vulnerability in the detection engine parsing of Pragmatic General
Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote
attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting.
The vulnerability is due to improper input validation of the fields in the
PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the
detection engine on the targeted device.
An exploit could allow the attacker to cause a DoS condition if the Snort
process restarts and traffic inspection is bypassed or traffic is dropped.
See the referenced vendor advisory for a solution.
Common Vulnerability Exposure (CVE) ID: CVE-2016-6368|
BugTraq ID: 97932
BugTraq ID: 98292
|Copyright||This script is Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 69071 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.