Cisco Cisco FirePOWER Appliance 8390 Notas de publicación
Version 5.2.0.8
Sourcefire 3D System Release Notes
19
Issues Resolved in Version 5.2.0.8
•
Resolved an issue where the primary and secondary devices in a clustered
stack were unable to reestablish high availability link connectivity if the
system experienced a loss of high availability link. (143906/CSCze94080)
•
Resolved an issue where, during the processing of retransmitted
transmission control protocol (TCP) packets, the devices could experience
additional latency. (144222/CSCze94683)
•
Resolved an issue where the system experienced a FSIC failure.
(144878/CSCze95325)
•
Resolved an issue where the 40GB fiber NetMod traffic statistics were
incorrectly logged traffic on the wrong 40GB port. (145515/CSCze95830)
•
Resolved an issue where you were unable to configure your Defense
Center as the network time protocol (NTP) source. (CSCus75305).
Issues Resolved in Previous Updates
Previously resolved issues are listed by version.
Version 5.2.0.7
•
Security Issue
Addressed an arbitrary injection vulnerability allowing
unauthenticated, remote attackers to execute commands via Bash. The fix
addresses CVE-2014-6271 and CVE-2014-7169. For more information, refer
to the Cisco Security Advisory page at
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-
sa-20140926-bash
. (144861/CSCze95469, 144940/CSCze95446,
144947/CSCze96152)
Version 5.2.0.6
•
Security Issue
Addressed multiple cross-site scripting (XSS) vulnerabilities.
•
Security Issue
Addressed multiple cross-site request forgery (CSRF)
vulnerabilities.
•
Security Issue
Addressed multiple injection vulnerabilities, including HTML
and command line injections.
•
Security Issue
Addressed multiple vulnerability issues in Linux, strongSwan,
and Wireshark, including those described in CVE-2013-2237,
CVE-2013-5718, CVE-2013-5719, CVE-2013-5720, CVE-2013-5721,
CVE-2013-5722, and CVE-2013-2338.
•
Resolved an issue where, if you modified the interface type on a routed or
switched interface associated with a hybrid interface, applying the device
configuration failed. (132221/CSCze88314)
•
Resolved an issue where, if you configured Simple Network Management
Protocol (SNMP) polling on a Series 3 managed device, the system
retrieved non-compliant RFC data. (135323/CSCze89413)