Secunia Security Advisory - A vulnerability has been reported in Cisco Catalyst Content Switching Module (CSM) and Cisco Catalyst Content Switching Module with SSL (CSM-S), which can be exploited by malicious people to cause a DoS (Denial of Service).
dd88e8966297bda8f5bf85eb62c67f0ca7df81057e4de353df6a5c6fc01309ec
----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
The Public Beta has ended. Thanks to all that participated.
Learn more:
http://secunia.com/network_software_inspector_2/
----------------------------------------------------------------------
TITLE:
Cisco Catalyst Content Switching Module Memory Leak Vulnerability
SECUNIA ADVISORY ID:
SA30223
VERIFY ADVISORY:
http://secunia.com/advisories/30223/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Cisco Catalyst Content Switching Module (CSM) 4.x
http://secunia.com/product/15616/
Cisco Catalyst Content Switching Module with SSL (CSM-S) 2.x
http://secunia.com/product/15617/
DESCRIPTION:
A vulnerability has been reported in Cisco Catalyst Content Switching
Module (CSM) and Cisco Catalyst Content Switching Module with SSL
(CSM-S), which can be exploited by malicious people to cause a DoS
(Denial of Service).
The vulnerability is caused due to a memory leak error when
processing TCP segments with a specific combination of TCP flags and
can be exploited to cause a DoS.
Successful exploitation requires that CSM or CSM-S is configured for
layer 7 load balancing.
The vulnerability is reported in the following versions:
* CSM 4.2(3), 4.2(3a), 4.2(4), 4.2(5), 4.2(6), 4.2(7), and 4.2(8)
* CSM-S 2.1(2), 2.1(3), 2.1(4), 2.1(5), 2.1(6), and 2.1(7)
SOLUTION:
Update to CSM version 4.2.9 or CSM-S version 2.1.8.
Cisco CSM 4.2.9:
http://www.cisco.com/pcgi-bin/tablebuild.pl/cat6000-csm?psrtdcat20e2
Cisco CSM 2.1.8:
http://www.cisco.com/pcgi-bin/tablebuild.pl/cat6000-csms?psrtdcat20e2
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20080514-csm.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------