Description
A vulnerability in the memory management handling for the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart. This vulnerability is due to a logic error in memory management when a device is performing Snort 3 SSL packet inspection. An attacker could exploit this vulnerability by sending crafted SSL packets through an established connection to be parsed by the Snort 3 Detection Engine. A successful exploit could allow the attacker to cause a denial of service (DoS) condition when the Snort 3 Detection Engine unexpectedly restarts.
Problem types
Access of Memory Location After End of Buffer
Product status
7.4.0
7.4.1
7.4.1.1
7.6.0
7.4.2
7.4.2.1
References
sec.cloudapps.cisco.com/...y/cisco-sa-ftd-snort3ssl-FBEKYXpH (cisco-sa-ftd-snort3ssl-FBEKYXpH)