Cisco Cisco Firepower Management Center 2000

Seite von 32
 
17
FireSIGHT System Release Notes
Version 5.3.1.7
  Resolved Issues
The uninstallation process begins. You can monitor the uninstallation progress in the task queue (
System 
> Monitoring > Task Status
).
Caution
Do not use the web interface to perform any other tasks until the uninstallation has completed and the 
Defense Center reboots. Before the uninstallation completes, the web interface may become unavailable 
and the Defense Center may log you out. This is expected behavior; log in again to view the task queue. 
If the uninstallation is still running, do not use the web interface until the uninstallation has completed. 
If you encounter issues with the uninstallation (for example, if the task queue indicates that the update 
has failed or if a manual refresh of the task queue shows no progress for several minutes), do not restart 
the uninstallation. Instead, contact Support.
Step 7
After the uninstallation finishes, clear your browser cache and force a reload of the browser. Otherwise, 
the user interface may exhibit unexpected behavior.
Step 8
Log in to the Defense Center.
Step 9
Select 
Help > About
 and confirm that the software version is listed correctly: Version 5.3.1.
Step 10
Verify that the appliances in your deployment are successfully communicating and that there are no 
issues reported by the health monitor.
Resolved Issues
You can track defects resolved in this release using the Cisco Bug Search Tool 
(
https://tools.cisco.com/bugsearch/
). A Cisco account is required. The following sections list the issues 
resolved in the Version 5.3.1.7 update.
Issues Resolved in Version 5.3.1.7:
Security Issue 
Addressed an unauthenticated, arbitrary execution allowing unauthenticated attackers 
to affect the HTTPS connection during a rule update from 
support.sourcefire.com
, as described in 
CVE-2015-6357.
Security Issue 
Addressed a vulnerability in the third-party product Linux that allowed an 
authenticated user to cause Denial of Service, as described in CVE-2015-5364.
Security Issue 
Addressed an arbitrary HTTP header injection vulnerability allowing 
unauthenticated, remote attackers to exploit managed devices as described in CVE-2016-1345.
Resolved an issue where the memory usage health monitor erroneously generated false positives. 
(144593/CSCze94840)
Resolved an issue where, if you logged into your system as a user other than the 
admin
 user and 
edited the base layer of an intrusion policy, the system incorrectly marked all affected edited 
intrusion policies as updated by 
admin
 when it should not have. (CSCur79437)
Resolved an issue where the /var/home directory on a Defense Center was directed to the wrong 
directory. (CSCut80381)
Resolved an issue where, if a host generated an indication of compromise (IOC) and you disabled 
the IOC for that host on the Host Profile page, the Indications of Compromise by Host dashboard 
widget incorrectly displayed the IOC. (CSCuv41376)