Cisco Cisco FirePOWER Appliance 7110 Release Notes
Version 5.2.0.8
Sourcefire 3D System Release Notes
22
Issues Resolved in Version 5.2.0.8
•
Resolved an issue where, in some cases, the eStreamer client failed to
deserialize network discovery user events and the system generated an
error message. (126827)
•
Resolved an issue where, after updating an appliance running Version 5.1.x
of the Sourcefire 3D System and Version 2.0.3 of the Sourcefire User Agent
to Version 5.2 of the Sourcefire 3D System, the system generated an
extraneous health alert. (127082, 127265, 127724)
•
Resolved an issue where, if the system logged the only intrusion event
associated with a connection as
Would have dropped
, the associated
connection logged with the incorrect action of
Block
. (127141)
•
Resolved an issue where, in rare cases, the system detected a user login
through network discovery but the Defense Center incompletely logged the
user data. (127274)
•
Improved the stability of custom application detectors. (127309)
•
Resolved an issue where you could not replace one NetMod with another
on devices managed by Defense Centers in a high availability configuration.
(128091)
•
The system now notifies you upon intrusion policy commit if your intrusion
policy contains invalid system default variable configurations. (129105)
•
Resolved an issue where changes to the system variable set from within an
intrusion policy were not applied if the default action of your access control
policy was a Sourcefire authored policy. (129179)
•
Improved the stability of the
byte_extract
keyword and the HTTP inspect
preprocessor. (129329, 129843, 130005)
•
Resolved a hardware issue that, in rare cases, could cause a disruption in
traffic. (130055)
•
Resolved a memory leak on managed devices that, in some cases,
necessitated a system reboot. (130198)
•
Resolved a memory leak within the eStreamer client. (130478)
•
Security Issue
https://na8.salesforce.com/articles/Informational/000002045
. (131040)
•
Security Issue
Resolved an issue where the Sourcefire 3D System web
server had the potential to execute system commands as root. Special
thanks to Detmar Liesen and Christian Rahmen at Information und Technik
Nordrhein-Westfalen (IT.NRW) for reporting this issue. (131737)
•
Security Issue
Eliminated a vulnerability that could allow an attacker to
execute Linux commands via the filter search field on the System Log page.
For more information, log in to the Customer Center and access the KB
(131738)