Cisco Adaptive Security Appliance (ASA) Software is the operating system used by the Cisco ASA 5500 Series Adaptive Security Appliances, the Cisco ASA 5500-X Next Generation Firewall, the Cisco ASA Services Module (ASASM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, the Cisco ASA 1000V Cloud Firewall, and the Cisco Adaptive Security Virtual Appliance (ASAv). The Cisco ASA family provides network security services such as firewall, intrusion prevention system (IPS), anti-X, and VPN.

A vulnerability in SQL*Net inspection engine code could allow an unauthenticated, remote attacker to cause a reload of the affected system.

The vulnerability is due to improper handling of crafted SQL REDIRECT packets. An attacker could exploit this vulnerability by sending a crafted sequence of REDIRECT packets through the affected system.Only transit traffic that is inspected by the Cisco ASA SQL*Net inspection engine can be used to exploit this vulnerability. This vulnerability affects both routed and transparent firewall mode in both single and multiple context mode. This vulnerability can be triggered by IP version 4 (IPv4) and IP version 6 (IPv6) traffic.This vulnerability is documented in Cisco bug ID CSCum46027 registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2014-3382.A vulnerability in the IKE code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the reload of an affected system.The vulnerability is due to insufficient validation of UDP packets. An attacker could exploit this vulnerability by sending crafted UDP packets to the affected system. An exploit could allow an attacker to cause a reload of an affected system.Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IP version 4 (IPv4) and IP version 6 (IPv6) traffic.This vulnerability is documented in Cisco bug ID CSCul36176 registered customers only) and has been assigned CVE ID CVE-2014-3383.A vulnerability in the IKEv2 code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause the reload of an affected system.

The vulnerability is due to improper handling of crafted IKEv2 packets. An attacker could exploit this vulnerability by sending a crafted packet during the establishment of an IKEv2 tunnel. An exploit could allow the attacker to cause a reload of the affected system leading to a DoS condition

Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.This vulnerability is documented in Cisco bug ID CSCum96401 registered customers only) and has been assigned CVE ID CVE-2014-3384.

A vulnerability in Health and Performance Monitoring (HPM) for ASDM functionality of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of an affected device and eventual denial of service (DoS) condition.

The vulnerability is due to a race condition in the operation of the HPM functionality. An attacker could exploit this vulnerability by sending a large number of half-open simultaneous connections to be established through the affected device. An exploit could allow the attacker to cause a reload of an affected device, which could lead to a DoS condition.Only transit TCP traffic can be used to exploit this vulnerability. This vulnerability affects both routed and transparent firewall mode in both single and multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.This vulnerability is documented in Cisco bug ID CSCum00556 registered customers only) and has been assigned CVE ID CVE-2014-3385.A vulnerability in the GPRS Tunneling Protocol (GTP) inspection engine of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the reload of an affected system.The vulnerability is due to improper handling of GTP packets when sent in a specific sequence. An attacker could exploit this vulnerability by sending crafted GTP packets through an affected system. An exploit could allow the attacker to cause the reload of an affected systemOnly transit traffic that is inspected by the Cisco ASA GTP inspection engine can be used to exploit this vulnerability. This vulnerability affects both routed and transparent firewall mode in both single and multiple context mode. This vulnerability can only be triggered by IPv4 traffic.This vulnerability is documented in Cisco bug ID CSCum56399 registered customers only) and has been assigned CVE ID CVE-2014-3386.A vulnerability in the SunRPC inspection engine of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the reload of an affected system.The vulnerability is due to insufficient validation of crafted SunRPC packets. An attacker could exploit this vulnerability by sending crafted SunRPC packets through the affected system. An exploit could allow the attacker to cause the reload of an affected system.Only transit traffic that is inspected by the Cisco ASA SunRPC inspection engine can be used to exploit this vulnerability. This vulnerability affects both routed and transparent firewall mode in both single and multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.This vulnerability is documented in Cisco bug ID CSCun11074 registered customers only) and has been assigned CVE ID CVE-2014-3387.A vulnerability in the DNS inspection engine of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause the reload of an affected system.

The vulnerability is due to insufficient validation of crafted DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through the affected system. An exploit could allow the attacker to cause the reload of an affected system.

Only transit traffic that is inspected by the Cisco ASA DNS inspection engine can be used to exploit this vulnerability. This vulnerability affects both routed and transparent firewall mode in both single and multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.This vulnerability is documented in Cisco bug ID CSCuo68327 registered customers only) and has been assigned CVE ID CVE-2014-3388.A vulnerability in the VPN code of Cisco ASA Software could allow an authenticated, remote attacker to submit configuration commands to the standby unit via the failover interface. As result, an attacker could be able to take full control of both the active and standby failover units.The vulnerability is due to improper implementation of the internal filter for packets coming from an established VPN tunnel. An attacker could exploit this vulnerability by sending crafted packets directed to the failover interface IP address.Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects only systems configured in routed firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.This vulnerability is documented in Cisco bug ID CSCuq28582 registered customers only) and has been assigned CVE ID CVE-2014-3389.A vulnerability in the Virtual Network Management Center (VNMC) policy code of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, local attacker to access the underlying Linux operating system with the privileges of the root user.The vulnerability is due to insufficient sanitization of user supplied input. An attacker could exploit this vulnerability by logging in to an affected system as administrator, copying a malicious script onto the disk, and executing the script.Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects both routed and transparent firewall mode in both single and multiple context mode. In default configuration, Administration or privilege 15 access is needed in order to exploit this vulnerability.This vulnerability is documented in Cisco bug ID CSCuq41510 registered customers only) and CSCuq47574 registered customers only) and has been assigned CVE ID CVE-2014-3390.A vulnerability in the function that exports environment variables of Cisco ASA Software could allow an authenticated, local attacker to inject a malicious library and take complete control of the system.The vulnerability is due to improper setting of the LD_LIBRARY_PATH environment. An attacker could exploit this vulnerability by copying a malicious library onto the affected system's external memory and triggering a reload of the system. An exploit could allow the attacker to force the affected system to load a malicious library and access the underlying Linux OS, which could lead to a full compromise of the system.Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects both routed and transparent firewall mode in both single and multiple context mode. In order to exploit this vulnerability a reload of the system is needed. In default configuration, Administration or privilege 15 access is needed in order to exploit this vulnerability.This vulnerability is documented in Cisco bug ID CSCtq52661 registered customers only) and has been assigned CVE ID CVE-2014-3391.A vulnerability in the Clientless SSL VPN portal feature could allow an unauthenticated, remote attacker to access random memory locations. Due to this vulnerability, the attacker may be able to access the information stored in memory and in some cases may be able to corrupt this portion of memory, which could lead to a reload of the affected system.The vulnerability is due to insufficient sanitization of user-supplied input. An attacker could exploit this vulnerability by setting random values on parameters passed during access to the Clientless SSL VPN portal.Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects only systems configured in routed firewall mode and only in single context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid TCP handshake is required to exploit this vulnerability.This vulnerability is documented in Cisco bug ID CSCuq29136 registered customers only) and has been assigned CVE ID CVE-2014-3392.

A vulnerability in the Clientless SSL VPN portal customization framework could allow an unauthenticated, remote attacker to modify the content of the Clientless SSL VPN portal, which could lead to several attacks including the stealing of credentials, cross-site scripting (XSS), and other types of web attacks on the client using the affected system.

The vulnerability is due to a improper implementation of authentication checks in the Clientless SSL VPN portal customization framework. An attacker could exploit this vulnerability by modifying some of the customization objects in the RAMFS cache file system. An exploit could allow the attacker to bypass Clientless SSL VPN authentication and modify the portal content.Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects only systems configured in routed firewall mode and only in single context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid TCP handshake is required to exploit this vulnerability.This vulnerability is documented in Cisco bug ID CSCup36829 registered customers only) and has been assigned CVE ID CVE-2014-3393.A vulnerability in the Smart Call Home (SCH) feature of Cisco ASA Software could allow an unauthenticated, remote attacker to bypass digital certificate validation if any feature that uses digital certificates is configured on the affected system.The vulnerability exists because when SCH is configured, a trustpoint, including a VeriSign certificate, is automatically installed. An attacker could exploit this vulnerability by presenting a valid certificate signed by VeriSign when authenticating to the affected system. An exploit could allow the attacker, for example, to bypass digital certificate authentication when used by a given feature. Examples of features that could be configured to use digital certificates validation include VPN and Adaptive Security Device Management (ASDM) authentication, TLS Proxy, and Phone Proxy.Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects both routed and transparent firewall mode in both single and multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid TCP handshake is required to exploit this vulnerability.This vulnerability is documented in Cisco bug ID CSCun10916 registered customers only) and has been assigned CVE ID CVE-2014-3394.