Cisco Cisco Firepower Management Center 4000

Seite von 44
Version 5.2.0.8
Sourcefire 3D System Release Notes
19
Issues Resolved in Version 5.2.0.8
Resolved an issue where the primary and secondary devices in a clustered 
stack were unable to reestablish high availability link connectivity if the 
system experienced a loss of high availability link. (143906/CSCze94080)
Resolved an issue where, during the processing of retransmitted 
transmission control protocol (TCP) packets, the devices could experience 
additional latency. (144222/CSCze94683)
Resolved an issue where the system experienced a FSIC failure. 
(144878/CSCze95325)
Resolved an issue where the 40GB fiber NetMod traffic statistics were 
incorrectly logged traffic on the wrong 40GB port. (145515/CSCze95830)
Resolved an issue where you were unable to configure your Defense 
Center as the network time protocol (NTP) source. (CSCus75305).
Issues Resolved in Previous Updates
Previously resolved issues are listed by version.
Version 5.2.0.7
Security Issue
 Addressed an arbitrary injection vulnerability allowing 
unauthenticated, remote attackers to execute commands via Bash. The fix 
addresses CVE-2014-6271 and CVE-2014-7169. For more information, refer 
to the Cisco Security Advisory page at 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-
sa-20140926-bash
. (144861/CSCze95469, 144940/CSCze95446, 
144947/CSCze96152)
Version 5.2.0.6
Security Issue 
Addressed multiple cross-site scripting (XSS) vulnerabilities.
Security Issue
 Addressed multiple cross-site request forgery (CSRF) 
vulnerabilities.
Security Issue
 Addressed multiple injection vulnerabilities, including HTML 
and command line injections.
Security Issue
 Addressed multiple vulnerability issues in Linux, strongSwan, 
and Wireshark, including those described in CVE-2013-2237, 
CVE-2013-5718, CVE-2013-5719, CVE-2013-5720, CVE-2013-5721, 
CVE-2013-5722, and CVE-2013-2338.
Resolved an issue where, if you modified the interface type on a routed or 
switched interface associated with a hybrid interface, applying the device 
configuration failed. (132221/CSCze88314)
Resolved an issue where, if you configured Simple Network Management 
Protocol (SNMP) polling on a Series 3 managed device, the system 
retrieved non-compliant RFC data. (135323/CSCze89413)