lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 15 Oct 2014 11:57:40 -0400
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Cisco TelePresence MCU Software Memory Exhaustion Vulnerability 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Cisco TelePresence MCU Software Memory Exhaustion Vulnerability

Advisory ID: cisco-sa-20141015-mcu

Revision 1.0

For Public Release 2014 October 15 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

A vulnerability in the network stack of Cisco TelePresence MCU Software could allow an unauthenticated, remote attacker to cause the exhaustion of available memory which could lead to system instability and a reload of the affected system.

Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-mcu

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)

iQIVAwUBVD6PuopI1I6i1Mx3AQIoTA/8CLL2URdaLZq8admPaFm/i4tVWu890ZSr
IhV68RhjbDUQMAhRb8XldfizlYiQSkZqh5tVw8u2r4ksHftnBsuTxyfVBA/+d+XK
6/Pfr15JlzhfoJgG5hD4KAvpyS+VGoM3ST2Z0iRykDk6+/T8hDLItzmrivyNPQ3K
PQw82YMArGL1TTcdTjmUHm9F7Kqg2wzR+F0K5swv/Z+P+rflBATszNcltpfEd7kt
AmIquiUyg9c0n9z27zNDJzqjHvIcuwVB0NcneH9X2tRW0V3x5ske71TTVqdSSlau
UPLESYUnNewXUpfylCvnvC5LQOCwrG5871kfgdOEYLyrqtk2iL9/xRUkzCeHvGj/
O9QmG2HoCvStvABQVdChgEFE349eGNuZ5Rm/TiqBUtAl1o1cND+q9NsCprGAYxLl
7ZkyzlQ8tpbmIbkb0ehv5Mc8lZaeE0Pnfg2KuPVIcfhpmK2LyIErPU1TdU0pTe9f
O4P5HoOVD5DyfUvCueTr9+Fa/uJKcZP8XCgBTPB5EHHU4H992/lQJ3lejgbYlHlS
YaNy7+ccaXREgtly29TFwJ8guMDYTiVKPtzcuyveGfIKkP9/kxtoPVWzRpE7Gq52
LafhNCMXZ1rSGUPf348n3OqsYI8EsvHWFwMvfWZ8hs1KktIrn2+pPZNAgLpl/sCJ
BqwBif7+3sk=
=nJrb
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ