You are here
Home > Preporuke > Ranjivost Cisco LISP protokola

Ranjivost Cisco LISP protokola

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

Cisco Security Advisory: Cisco IOS and NX-OS Software Locator/ID Separation Protocol Packet Denial of Service Vulnerability

Advisory ID: cisco-sa-20160323-lisp

Revision 1.0

For Public Release 2016 March 23 16:00 GMT

+———————————————————————

Summary
=======

A vulnerability in the Locator/ID Separation Protocol (LISP) of Cisco IOS Software running on the Cisco Catalyst 6500 and 6800 Series Switches and Cisco NX-OS Software running on the Cisco Nexus 7000 and Nexus 7700 Series Switches with an M1 Series Gigabit Ethernet Module could allow an unauthenticated, remote attacker to cause a reload of the vulnerable device.

The vulnerability is due to a lack of proper input validation when a malformed LISP packet header is received. An attacker could exploit this vulnerability by sending a malformed LISP packet on UDP port 4341. An exploit could allow the attacker to cause a denial of service (DoS) condition.

Cisco has released software updates that address this vulnerability.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-lisp

This advisory is part of the March 23, 2016, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes six Cisco Security Advisories that describe six vulnerabilities. All the vulnerabilities have a Security Impact Rating of “High.” For a complete list of advisories and links to them, see Cisco Event Response:
http://www.cisco.com/c/en/us/about/security-center/event-response/cisco-erp-march-2016.html

—–BEGIN PGP SIGNATURE—–
Comment: GPGTools – http://gpgtools.org
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=v8Kq
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Ranjivost Smart Install značajke

Otkrivena je ranjvost u klijentskoj značajki Smart Install u Cisco IOS i IOS XE softveru. Ranjivost je uzrokovana neispravnim upravljanjem...

Close