You are here
Home > Preporuke > Ranjivost softvera Cisco IOS XR

Ranjivost softvera Cisco IOS XR

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco IOS XR Software IPv6 Malformed Packet Denial of Service Vulnerability

Advisory ID: cisco-sa-20140611-ipv6

Revision 1.0

For Public Release 2014 June 11 16:00 UTC (GMT)

Summary
=======

A vulnerability in the parsing of malformed Internet Protocol version 6 (IPv6) packets in Cisco IOS XR Software for ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause a lockup and eventual reload of a Network Processor (NP) chip and a line card processing traffic. Only Trident-based line cards on Cisco ASR 9000 Series Aggregation Services Routers are affected by this vulnerability.

The vulnerability is due to insufficient logic in parsing malformed IPv6 packets. An attacker could exploit this vulnerability by sending a stream of malformed IPv6 packets to the affected device. An exploit could allow the attacker to cause a lockup and eventual reload of an NP chip and a line card, leading to a denial of service (DoS) condition.

Cisco has released free software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140611-ipv6

—–BEGIN PGP SIGNATURE—–
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools – http://gpgtools.org
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=rfKB
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Nadogradnja za iceweasel

Otkrivene su višestruke ranjivosti u web pregledniku Iceweasel za Debian. Višestruka narušavanja integriteta radne memorije i preljevi spremnika mogu dovesti...

Close