Administrators are advised to apply the appropriate patch.
Administrators may wish to disable enhanced inspection of HTTP traffic by removing the line inspect http %appfw% from the configuration, where appfw is the name of an HTTP map. However, this will result in a less granular inspection of HTTP traffic. If this is done, inspect http should be left configured because it will still provide some protection against malicious HTTP requests.
The Cisco Applied Intelligence team has created the following companion document to guide administrators in identifying and mitigating attempts to exploit this vulnerability prior to applying updated software: Identifying and Mitigating Exploitation of Multiple Vulnerabilities in Cisco ASA/PIX/FWSM Firewalls["http://www.cisco.com/warp/public/707/cisco-air-20070214-firewall.shtml"]