Cisco Cisco Firepower Management Center 4000 Release Notes

Page of 46
Version 5.3.0.5
Sourcefire 3D System Release Notes
18
Resolved Issues
4. At the prompt, type the following on a single line and press Enter:
install_update.pl 
/var/sf/updates/Sourcefire_3D_XOS_Device_Patch_Uninstaller-
5.3.0.5-18.sh
The update is removed and the VAP reloads. If your Sourcefire Software for 
X-Series is deployed inline, traffic to that VAP is interrupted while the VAP 
reloads. Note, however, that if there are other VAPs in the VAP group, traffic 
is load balanced among the other VAPs.
5. On the managing Defense Center, select Devices > Device Management and 
confirm that the software version is listed correctly: Version 5.3.0.4.
6. Verify that the Sourcefire Software for X-Series is successfully 
communicating with the Defense Center.
7. Repeat steps 1 through 6 for each VAP in the VAP group.
Resolved Issues
Cisco recently changed caveat tracking systems and issues addressed in Version 
5.3.0.2 and forward are tracked via 
https://tools.cisco.com/bugsearch/
. A Cisco 
account is required. To view bugs addressed in older versions, refer to the 
previous caveat tracking system. The following resolved issues are reported in 
Version 5.3.0.5:
Security Issue
 Addressed multiple cross-site scripting (XSS) vulnerabilities. 
(CSCus07858, CSCus07875)
Security Issue
 Addressed multiple vulnerabilities in SSLv3 that allowed 
external attacks on client connections, as described in CVE-2014-3569, 
CVE-2014-3570, CVE-2014-3572, CVE-2015-0204, CVE-2015-0286, 
CVE-2015-0287, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293.
If you enable bypass on inline sets on your Series 3 device, you may lose 
connectivity for up to 25 seconds during device reboot. (CSCur64678)
Resolved an issue where the system does not recognize which IP address 
is the primary address and does not establish an Open Shortest Path First 
(OSPF) connection if you configured the router interface of your clustered 
Series 3 managed devices to both a private IP address and a Cisco 
Redundancy Protocol (SFRP) IP address. (CSCur86355)
Improved the stability of network processing firmware. (CSCut80043)
Resolved an issue where certain high availability packets caused traffic 
inspection to stop while components restarted. (CSCuu10871)
Issues Resolved in Previous Updates
You can track defects resolved in this release using the Cisco Bug Search Tool 
(
https://tools.cisco.com/bugsearch/
). A Cisco account is required. To view defects