exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20140908-ucse

Cisco Security Advisory 20140908-ucse
Posted Sep 11, 2014
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the Cisco Integrated Management Controller (Cisco IMC) SSH module of the Cisco Unified Computing System E-Series Blade servers could allow an unauthenticated, remote attacker to cause a denial of service condition. The vulnerability is due to a failure to properly handle a crafted SSH packet. An attacker could exploit this vulnerability by sending a crafted packet to the SSH server running on the Cisco IMC of an affected device, which could result in the Cisco IMC becoming unresponsive. The operating system running on the blade will be unaffected. Cisco has released free software updates that address this vulnerability.

tags | advisory, remote, denial of service
systems | cisco
SHA-256 | 3f247458f5de3f93abd4ed9c538945e9d37f45d46ccead5e184b48fc8aa2c4c7

Cisco Security Advisory 20140908-ucse

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Unified Computing System E-Series Blade Servers Cisco Integrated Management Controller SSH Denial of Service Vulnerability

Advisory ID: cisco-sa-20140908-ucse

Revision 1.0

For Public Release 2014 September 8 16:00 UTC (GMT)
+--------------------------------------------------------------------

Summary
=======

A vulnerability in the Cisco Integrated Management Controller (Cisco IMC) SSH module of the Cisco Unified Computing System E-Series Blade servers could allow an unauthenticated, remote attacker to cause a denial of service condition.

The vulnerability is due to a failure to properly handle a crafted SSH packet. An attacker could exploit this vulnerability by sending a crafted packet to the SSH server running on the Cisco IMC of an affected device, which could result in the Cisco IMC becoming unresponsive. The operating system running on the blade will be unaffected.

Cisco has released free software updates that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140908-ucse

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=Ydqd
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close