exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20150611-iosxr

Cisco Security Advisory 20150611-iosxr
Posted Jun 11, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the IP version 6 (IPv6) processing code of Cisco IOS XR Software for Cisco CRS-3 Carrier Routing System could allow an unauthenticated, remote attacker to trigger an ASIC scan of the Network Processor Unit (NPU) and a reload of the line card processing an IPv6 packet. The vulnerability is due to incorrect processing of an IPv6 packet carrying IPv6 extension headers that are valid but unlikely to be seen during normal operation. An attacker could exploit this vulnerability by sending such an IPv6 packet to an affected device that is configured to process IPv6 traffic. An exploit could allow the attacker to cause a reload of the line card, resulting in a DoS condition. Cisco has released free software updates that address this vulnerability. There is no workaround that mitigates this vulnerability.

tags | advisory, remote
systems | cisco, osx
SHA-256 | e56b00b94f7935d03ca8b85ffb3a47abd5d4c85aedc4c8a4a169c488060e8544

Cisco Security Advisory 20150611-iosxr

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Cisco IOS XR Software Crafted IPv6 Packet Denial of Service Vulnerability

Advisory ID: cisco-sa-20150611-iosxr

Revision 1.0

For Public Release 2015 June 11 16:00 UTC (GMT)

+-----------------------------------------------------------------------

Summary
=======

A vulnerability in the IP version 6 (IPv6) processing code of Cisco IOS XR Software for Cisco CRS-3 Carrier Routing System could allow an unauthenticated, remote attacker to trigger an ASIC scan of the Network Processor Unit (NPU) and a reload of the line card processing an IPv6 packet.

The vulnerability is due to incorrect processing of an IPv6 packet carrying IPv6 extension headers that are valid but unlikely to be seen during normal operation. An attacker could exploit this vulnerability by sending such an IPv6 packet to an affected device that is configured to process IPv6 traffic. An exploit could allow the attacker to cause a reload of the line card, resulting in a DoS condition.

Cisco has released free software updates that address this vulnerability. There is no workaround that mitigates this vulnerability.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150611-iosxr

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
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=o+ei
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close