lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <201406111203.5.ipv6@psirt.cisco.com>
Date: Wed, 11 Jun 2014 12:03:36 -0400
From: Cisco Systems Product Security Incident Response Team <psirt@...co.com>
To: bugtraq@...urityfocus.com
Cc: psirt@...co.com
Subject: Cisco Security Advisory: Cisco IOS XR Software IPv6 Malformed Packet Denial of Service Vulnerability 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS XR Software IPv6 Malformed Packet Denial of Service Vulnerability

Advisory ID: cisco-sa-20140611-ipv6

Revision 1.0

For Public Release 2014 June 11 16:00  UTC (GMT)

Summary
=======

A vulnerability in the parsing of malformed Internet Protocol version 6 (IPv6) packets in Cisco IOS XR Software for ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause a lockup and eventual reload of a Network Processor (NP) chip and a line card processing traffic. Only Trident-based line cards on Cisco ASR 9000 Series Aggregation Services Routers are affected by this vulnerability.

The vulnerability is due to insufficient logic in parsing malformed IPv6 packets. An attacker could exploit this vulnerability by sending a stream of malformed IPv6 packets to the affected device. An exploit could allow the attacker to cause a lockup and eventual reload of an NP chip and a line card, leading to a denial of service (DoS) condition.


Cisco has released free software updates that address this vulnerability. 
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140611-ipv6

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=rfKB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ