Log

ASA-201805-12 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A remote attacker is able to crash the application or execute arbitrary code via a specially crafted PDF file.
ASA-201805-13 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A malicious, remote server can cause a denial of service via a crafted RTSP answer, and execute arbitrary code on the affected host via a crafted FTP answer.
ASA-201805-14 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A malicious, remote server can cause a denial of service via a crafted RTSP answer, and execute arbitrary code on the affected host via a crafted FTP answer.
ASA-201805-15 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A malicious, remote server can cause a denial of service via a crafted RTSP answer, and execute arbitrary code on the affected host via a crafted FTP answer.
ASA-201805-16 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A malicious, remote server can cause a denial of service via a crafted RTSP answer, and execute arbitrary code on the affected host via a crafted FTP answer.
ASA-201805-17 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A malicious, remote server can cause a denial of service via a crafted RTSP answer, and execute arbitrary code on the affected host via a crafted FTP answer.
ASA-201805-18 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A malicious, remote server can cause a denial of service via a crafted RTSP answer, and execute arbitrary code on the affected host via a crafted FTP answer.
ASA-201805-19 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A remote attacker is able to cause a denial of service via a specially crafted file.
ASA-201805-2 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A remote attacker is able to execute arbitrary code or disclose information by providing a specially crafted file.
ASA-201805-20 created at 25 Sep 2019 19:32:14
Workaround
+ - CVE-2018-5736
+
+ For servers which must receive notifies to keep slave zone contents
+ current, no complete workarounds are known although restricting BIND to
+ only accept NOTIFY messages from authorised sources can greatly
+ mitigate the risk of attack.
+
+ - CVE-2018-5737
+
+ Setting "max-stale-ttl 0;" in named.conf will prevent exploitation of
+ this vulnerability (but will effectively disable the serve-stale
+ feature.)
Impact
+ A remote attacker is able to cause a denial of service via crafted queries.