Published on: 22 October 2015
Cisco has released security advisories fixing a number of vulnerabilities in Cisco security appliances, virtual appliances and services modules as listed below:
There are multiple attack vectors against the affected systems or modules. An unauthenticated remote attacker could send crafted UDP packets, crafted DNS request and spoofed DNS response, or crafted DHCPv6 packets to an affected system to exploit the vulnerabilities.
A successful attack could cause a reload of the affected system.
Patches for affected systems are now available. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk. For detailed information of the available patches, please refer to the section "Fixed Software" of corresponding security advisory at vendor's website.
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dhcp1
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns1
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns2
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-ike
https://www.us-cert.gov/ncas/current-activity/2015/10/21/Cisco-Releases-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6324
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6325
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6327