<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic +1 for upgrade recommendation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993185#M144409</link>
    <description>&lt;P&gt;+1 for upgrade recommendation. Still running 8.2.x in 2016 is not&amp;nbsp;a good idea.&lt;/P&gt;</description>
    <pubDate>Tue, 06 Dec 2016 21:47:33 GMT</pubDate>
    <dc:creator>Oliver Kaiser</dc:creator>
    <dc:date>2016-12-06T21:47:33Z</dc:date>
    <item>
      <title>Bug Search CSCva38556</title>
      <link>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993183#M144405</link>
      <description>&lt;DIV class="bugTitle"&gt;Cisco ASA Input Validation File Injection Vulnerability&lt;/DIV&gt;
&lt;DIV class="bugId"&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCva38556" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCva38556&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV class="bugId"&gt;&lt;/DIV&gt;
&lt;DIV class="bugId"&gt;Below is my device details:&lt;/DIV&gt;
&lt;DIV class="bugId"&gt;This platform has an ASA5585-SSP-20 VPN Premium license.&lt;BR /&gt;Serial Number: JAD173301HM&lt;/DIV&gt;
&lt;DIV class="bugId"&gt;Cisco Adaptive Security Appliance Software Version 8.2(5)49 &amp;lt;context&amp;gt;&lt;BR /&gt;Device Manager Version 7.1(2)&lt;/DIV&gt;
&lt;DIV class="bugId"&gt;&lt;/DIV&gt;
&lt;DIV class="bugId"&gt;&lt;/DIV&gt;
&lt;DIV class="bugId"&gt;How do I check if my ASA is expose to this bug?&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:37:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993183#M144405</guid>
      <dc:creator>zen-tek.tan</dc:creator>
      <dc:date>2019-03-12T08:37:18Z</dc:date>
    </item>
    <item>
      <title>It looks like this bug is</title>
      <link>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993184#M144407</link>
      <description>&lt;P&gt;It looks like this bug is listed to only affect&amp;nbsp;&lt;SPAN&gt;9.1(6.10), however, you are running a pretty old version of code that has tons of other vulnerabilities. There is a 8.2(5)59 interim update that you should consider moving to.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With that being said, it is a good idea to reach out to TAC and confirm 100% that your device and version of code is not affected by this specific defect.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I hope this helps!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2016 18:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993184#M144407</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-12-06T18:08:24Z</dc:date>
    </item>
    <item>
      <title>+1 for upgrade recommendation</title>
      <link>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993185#M144409</link>
      <description>&lt;P&gt;+1 for upgrade recommendation. Still running 8.2.x in 2016 is not&amp;nbsp;a good idea.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2016 21:47:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993185#M144409</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-12-06T21:47:33Z</dc:date>
    </item>
    <item>
      <title>Update: </title>
      <link>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993186#M144410</link>
      <description>&lt;P&gt;Update:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You ask an excellent question, but the confusion is well apparent, as seen in another thread:&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/13169031/cscva38556-cve-id-cve-2016-6461-known-fixed-releases&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;With that said,&amp;nbsp;9.5(3)6 was released on the 13th of December, it contains the fix for Bug CSCva38556, for the -x series models of the ASA:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/web/software/280775065/135839/ASA-953-Interim-Release-Notes.html"&gt;http://www.cisco.com/web/software/280775065/135839/ASA-953-Interim-Release-Notes.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;(So, like others, I am confused why&amp;nbsp;this version wasn't listed as "affected" by the bug, if it is going to receive the "fix" for the bug. )&lt;/P&gt;
&lt;P&gt;I re-check the bug to be sure, on 12/15/2016 (today), and it only lists 9.1(6)10 as a known &amp;nbsp;affected release. (if so, then why is 9.5(3) receiving a "fix"?)&lt;/P&gt;
&lt;P&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCva38556&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 14:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993186#M144410</guid>
      <dc:creator>lewislampkin</dc:creator>
      <dc:date>2016-12-15T14:17:44Z</dc:date>
    </item>
    <item>
      <title>Update: 9.17(12) was released</title>
      <link>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993187#M144411</link>
      <description>&lt;P&gt;Update: 9.17(12) was released on 12/21/2016.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It resolves the issue for the X-series as well as the older series devices.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Revision:&amp;nbsp; Version 9.1(7)12 – 12/21/2016&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Files:&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;asa917-12-smp-k8.bin, asa917-12-k8.bin&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Defects resolved since 9.1(&lt;SPAN&gt;7)11&lt;/SPAN&gt;:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;TABLE width="648"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="77"&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCva38556"&gt;CSCva38556&lt;/A&gt;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="571"&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco ASA Input Validation File Injection Vulnerability&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/web/software/280775065/131523/ASA-917-Interim-Release-Notes.html"&gt;http://www.cisco.com/web/software/280775065/131523/ASA-917-Interim-Relea...&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;TABLE cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;Description:&lt;/TD&gt;
&lt;TD&gt;Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;Release:&lt;/TD&gt;
&lt;TD&gt;9.1.7 Interim&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;Release Date:&lt;/TD&gt;
&lt;TD&gt;21/Dec/2016&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;File Name:&lt;/TD&gt;
&lt;TD&gt;asa917-12-k8.bin&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;Size:&lt;/TD&gt;
&lt;TD&gt;26.42 MB (27703296 bytes)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;MD5 Checksum:&lt;/TD&gt;
&lt;TD&gt;83cb9af376e5016fbcf8023c5c867335&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;SHA512 Checksum:&lt;/TD&gt;
&lt;TD&gt;
&lt;DIV&gt;50b892a4ae28d9c099c67210d4e5d0ff1dc1ee7534c7853111dcb3ee20d3c5f317d29097edf6b4d36139226738009b0760d6c391a182fb8bd4ca20010e9b1ad3&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;TABLE cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;Description:&lt;/TD&gt;
&lt;TD&gt;Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;Release:&lt;/TD&gt;
&lt;TD&gt;9.1.7 Interim&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;Release Date:&lt;/TD&gt;
&lt;TD&gt;21/Dec/2016&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;File Name:&lt;/TD&gt;
&lt;TD&gt;asa917-12-smp-k8.bin&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;Size:&lt;/TD&gt;
&lt;TD&gt;36.84 MB (38633472 bytes)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;MD5 Checksum:&lt;/TD&gt;
&lt;TD&gt;aa279845c795d9ec728577405f44a744&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;SHA512 Checksum:&lt;/TD&gt;
&lt;TD&gt;
&lt;DIV&gt;ed1bf84e8b7df2383c61a86e184aaa741b18a901895e794902d0eb770acf0f7d7187309d18955f3a243c1d572867308481f79b966579e713f52ff1381450707f&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 13:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bug-search-cscva38556/m-p/2993187#M144411</guid>
      <dc:creator>lewislampkin</dc:creator>
      <dc:date>2016-12-27T13:02:48Z</dc:date>
    </item>
  </channel>
</rss>

