Примечания к выпуску для Cisco Cisco FirePOWER Appliance 8250
Version 5.3.0.5
Sourcefire 3D System Release Notes
24
Resolved Issues
•
Resolved a memory issue on managed devices where the system omitted
data from Intrusion Event Performance graphs. (133944)
•
Resolved an issue where the system generated an abnormally high count
for the Total Packets Received Snort real-time statistic. (134036)
•
Resolved an issue where, in rare cases, the system generated an
extraneous Module Disk Usage: Frequent drain of Connection Events health alert.
(134355)
•
Resolved an issue where the system did not mark your access control
policy out-of-date after you applied a new version of the vulnerability
database (VDB) if your access control policy contained application detectors
related to the FireSight Detector Updates identified in the VDB advisory
notice. (134458)
•
Resolved an issue where, in some cases, scheduled geolocation updates
failed if Greenwich Mean Time (GMT, also known as UTC) was not your local
timezone. (134742)
•
Security Issue
Resolved multiple cross-site scripting (XSS) vulnerabilities in
application detection, access control, and correlation rule management.
(135011, 135629, 135632)
•
Improved the stability of Snort when access control rules included URL
conditions. (135071, 136833)
•
Resolved an issue where, if your managed device originated at Version
5.1.1.x and you updated it to Version 5.2.x and then to Version 5.3, the
system generated extraneous health alerts for high unmanaged disk usage.
(135689)
•
Resolved an issue where, if you updated an appliance from Version 5.2.x to
Version 5.3 and later created a backup, you could not restore the backup on
Defense Centers that were reimaged to Version 5.3. (135869)
•
Resolved an issue where the system displayed multiple unique hosts that
shared an IP address as a single host with multiple actual MAC addresses in
the host profile. (135956, 135992)
•
Resolved an issue where the system restricted access to the User
Management page (System > Local > User Management) on physical managed
devices. (136079)
•
Security Issue
Eliminated an XSS vulnerability (CVE-2014-2012) in the
intrusion rule editor pages that could allow an attacker to access and
disclose information, imitate user actions and requests, or execute arbitrary
JavaScript. Special thanks to Liad Mizrachi Check Point Security Research
Team for reporting this issue. (136542)
•
Security Issue
Eliminated a cross-site request forgery (CSRF) vulnerability
(CVE-2014-2011) in the User Configuration page that could allow an attacker
to add or edit user accounts. Special thanks to Liad Mizrachi Check Point
Security Research Team for reporting this issue. (136911)