A 3rd party runs a Nessus scan against our public IP addresses. They found the Multiple BSD ipfw/ip6fw ECE Bit Filtering Evasion vulnerability on the public IP address of our ASA 5510.
Does this sound right? Is there a specific patch I can apply to the ASA to remove the vulnerability?
Thank you,
Cisco Adaptive Security Appliance Software Version 7.2(2), Device Manager Version 5.2(2)
Hardware: ASA5510, 256 MB RAM, CPU Pentium 4 Celeron 1600 MHz
Multiple BSD ipfw / ip6fw ECE Bit Filtering Evasion
Description
The remote host seems vulnerable to a bug wherein a remote attacker can circumvent the firewall by setting the ECE bit within the TCP flags field. At least one firewall (ipfw) is known to exhibit this sort of behavior.
Known vulnerable systems include all FreeBSD 3.x ,4.x, 3.5-STABLE, and 4.2-STABLE.
Solution
If you are running FreeBSD 3.X, 4.x, 3.5-STABLE, 4.2-STABLE, upgrade your firewall. If you are not running FreeBSD, contact your firewall vendor for a patch.