exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20150722-tftp

Cisco Security Advisory 20150722-tftp
Posted Jul 22, 2015
Site cisco.com

cisco-sa-2015722-tftp.txt - A vulnerability in the TFTP server feature of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The TFTP server feature is not enabled by default. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.

tags | advisory, remote, denial of service
systems | cisco, osx
SHA-256 | 658481621117b1e5ad4720664e9f121c4ec0623b5bc76430db620a3e6fc56afc

Cisco Security Advisory 20150722-tftp

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco IOS Software TFTP Server Denial of Service Vulnerability

Advisory ID: cisco-sa-2015722-tftp

Revision 1.0

For Public Release 2015 July 22 16:00 UTC (GMT)

------------------------------------------------------------------------------------------

Summary
=======

A vulnerability in the TFTP server feature of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

The TFTP server feature is not enabled by default.

Cisco has released software updates that address this vulnerability.

Workarounds that mitigate this vulnerability are available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-tftp
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=v86R
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close