Twenty Year Anniversary

Cisco Security Advisory 20160323-smi

Cisco Security Advisory 20160323-smi
Posted Mar 23, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Smart Install client feature in Cisco IOS and IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect handling of image list parameters. An attacker could exploit this vulnerability by sending crafted Smart Install packets to TCP port 4786. A successful exploit could cause a Cisco Catalyst switch to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability other than disabling Smart Install functionality on the vulnerable device.

tags | advisory, remote, denial of service, tcp
systems | cisco, osx
MD5 | 748847f923f39a4ebca45945ba1c299c

Cisco Security Advisory 20160323-smi

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Cisco IOS and IOS XE Software Smart Install Denial of Service Vulnerability

Advisory ID: cisco-sa-20160323-smi

Revision 1.0

For Public Release 2016 March 23 16:00 GMT

+---------------------------------------------------------------------

Summary
=======

The Smart Install client feature in Cisco IOS and IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to incorrect handling of image list parameters. An attacker could exploit this vulnerability by sending crafted Smart Install packets to TCP port 4786. A successful exploit could cause a Cisco Catalyst switch to reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability other than disabling Smart Install functionality on the vulnerable device.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi

This advisory is part of the March 23, 2016, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes six Cisco Security Advisories that describe six vulnerabilities. All the vulnerabilities have a Security Impact Rating of "High." For a complete list of advisories and links to them, see Cisco Event Response:
http://www.cisco.com/c/en/us/about/security-center/event-response/cisco-erp-march-2016.html

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=joeO
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    15 Files
  • 11
    Dec 11th
    30 Files
  • 12
    Dec 12th
    25 Files
  • 13
    Dec 13th
    15 Files
  • 14
    Dec 14th
    14 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close