The Cisco ASA and PIX line of devices have three independent vulnerabilities that have been discovered and patched a few days ago. Just finished up with my own devices and nothing bad to report. Here’s a summary if you don’t wish to read the long-winded Cisco one.
1. Windows NT Domain Authentication Bypass Vulnerability.
Does not affect IPSec and SSL using external authentication VPN. Only NT domain authentication.
2. IPv6 Denial of Service Vulnerability.
Affects devices configured with IPv6 (by itself or in addition to IPv4). Does not affect devices running versions 7.0, 7.1, 8.0, or 8.1. Devices with versions 7.2(4)9 or 7.2(4)10 are affected only if IPv6 is enabled. It is disabled on all devices by default.
3. Crypto Accelerator Memory Leak Vulnerability.
Memory leak triggered by a series of packets. Only packets destined for device trigger it. The leak occurs in the initialization code of the crypto accelerator. ASA devices running version 8.0.x are vulnerable. ASA devices running versions 7.0, 7.1, 7.2 and all Cisco PIX devices are not affected.