I believe the workarounds can be found on the Cisco vulnerability report for those two.
Basically there is no workaround for the first one. If you are using MGCP protocol inspection, then you should upgrade your vesion. What version of 7.2 do you have? Have you checked if it's affected by this problem?
For the second one the work around is to limit your TLS traffic to only known hosts. Just allow ASDM access to a minimum of hosts that can be "trusted".
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...