<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892565#M153598</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you please share the CVE id of the vulnerability which you are trying to patch.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;</description>
    <pubDate>Tue, 24 May 2016 09:09:03 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2016-05-24T09:09:03Z</dc:date>
    <item>
      <title>firewall</title>
      <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892564#M153597</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; It seems there is a openssl Vulnerability for ASA. How to patch it, for ASA version 9.4.1 and is there any software update for it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;G.Pitchaimani&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall/m-p/2892564#M153597</guid>
      <dc:creator>pitchaimani.kamal</dc:creator>
      <dc:date>2019-03-12T07:47:24Z</dc:date>
    </item>
    <item>
      <title>Hi, </title>
      <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892565#M153598</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you please share the CVE id of the vulnerability which you are trying to patch.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2016 09:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall/m-p/2892565#M153598</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2016-05-24T09:09:03Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892566#M153600</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;DIV class="inlineblock"&gt;The CVE id for 6 vulnerabilities listed below,&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;First,four of them may cause memory corruption or excessive memory usage, 2nd one, could allow a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server supports AES-NI, and, 3rd one, is specific to a product performing an operation with&lt;EM&gt; &lt;/EM&gt;Extended Binary Coded Decimal Interchange Code (EBCDIC) encoding.&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;CVE-2016-2105&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;CVE-2016-2106&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;CVE-2016-2107&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;CVE-2016-2108&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;CVE-2016-2109&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;CVE-2016-2176&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;Kindly, tell me how to patch it in the cisco ASA 5585 with the OS of 9.4.1&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;Regards,&lt;/DIV&gt;
&lt;DIV class="inlineblock"&gt;G.Pitchaimani&lt;/DIV&gt;</description>
      <pubDate>Tue, 24 May 2016 10:00:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall/m-p/2892566#M153600</guid>
      <dc:creator>pitchaimani.kamal</dc:creator>
      <dc:date>2016-05-24T10:00:45Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892567#M153601</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cisco ASA running release 9.0 or later may be affected by the following vulnerabilities.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Exposure is not configuration dependent.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Padding oracle in AES-NI &lt;G class="gr_ gr_33 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="33" data-gr-id="33"&gt;CBC MAC&lt;/G&gt; &lt;G class="gr_ gr_37 gr-alert gr_gramm gr_run_anim Grammar multiReplace" id="37" data-gr-id="37"&gt;check&lt;/G&gt; CVE-2016-2107&lt;/P&gt;
&lt;P&gt;Memory corruption in the ASN.1 encoder CVE-2016-2108&lt;/P&gt;
&lt;P&gt;ASN.1 BIO excessive memory allocation CVE-2016-2109&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The ASA is not affected by the following vulnerabilities:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;EVP_EncodeUpdate overflow CVE-2016-2105&lt;/P&gt;
&lt;P&gt;EVP_EncryptUpdate overflow CVE-2016-2106&lt;/P&gt;
&lt;P&gt;EBCDIC overread CVE-2016-2176&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So while the ASA is not affected by the last 3, it may be affected by the first 3. There is no fixed version available yet but &lt;G class="gr_ gr_41 gr-alert gr_spell gr_run_anim ContextualSpelling" id="41" data-gr-id="41"&gt;its&lt;/G&gt; being tracked via a Sev2 defect, so we should have the fix soon:&lt;/P&gt;
&lt;P&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuz52474/?reffering_site=dumpcr&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2016 13:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall/m-p/2892567#M153601</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-05-24T13:53:37Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892568#M153602</link>
      <description>Hi,
  Ok. So, when shall i expect the updates for these vulnerabilities

Regards,
G.Pitchaimani</description>
      <pubDate>Thu, 26 May 2016 13:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall/m-p/2892568#M153602</guid>
      <dc:creator>pitchaimani.kamal</dc:creator>
      <dc:date>2016-05-26T13:09:09Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892569#M153604</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This being a Severity 2 bug expect a fix soon on this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Apologies but I do not have an exact ETA for this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 13:34:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall/m-p/2892569#M153604</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-05-26T13:34:09Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892570#M153605</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Is there any patch came for these vulnerabilities.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;G.Pitchaimani&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 07:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall/m-p/2892570#M153605</guid>
      <dc:creator>pitchaimani.kamal</dc:creator>
      <dc:date>2016-06-01T07:24:42Z</dc:date>
    </item>
    <item>
      <title>Hi, </title>
      <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892571#M153606</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Is there any update on OpenSSL vulnerabilities. Is there any patch available for OpenSSL Vulnerabilities.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;G.Pitchaimani&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2016 17:21:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall/m-p/2892571#M153606</guid>
      <dc:creator>pitchaimani.kamal</dc:creator>
      <dc:date>2016-06-13T17:21:01Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firewall/m-p/2892572#M153607</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The bug has been resolved and the fixed versions are listed in the bug details.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuz52474/?reffering_site=dumpcr&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can upgrade to the fixed versions to overcome this bug impact.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;DIV class="whiteRow"&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 14 Jun 2016 00:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall/m-p/2892572#M153607</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-06-14T00:44:27Z</dc:date>
    </item>
  </channel>
</rss>

