Cisco ASR 1000 Series Router UDP Packet Processing Flaw Lets Remote Users Cause the Target Service to Crash : 8/28/2015 5:38:04 AM

This eBook shows you how to build great push messages that convert for your app.
From our sponsors
 

 

Vulnerability Databse
This module replaces the description field of a feed to the page it links to (in addition, it wipes out the content:encoded field), so you can get its full text.

Cisco ASR 1000 Series Router UDP Packet Processing Flaw Lets Remote Users Cause the Target Service to Crash
8/28/2015 12:00:00 AM

Cisco ASR 1000 Series Router UDP Packet Processing Flaw Lets Remote Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1033406
SecurityTracker URL:  http://securitytracker.com/id/1033406
CVE Reference:   CVE-2015-6268   (Links to External Site)
Date:  Aug 28 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): ASR 1000 Series Routers; prior to 2.2.3 and prior to 2.3.0
Description:   A vulnerability was reported in Cisco ASR 1000 Series Routers. A remote user can cause the target service to crash.

A remote user can send a specially crafted UDP packet via IPv4 to the target device to cause the Embedded Services Processor (ESP) processing the packet to crash and the device to reload.

The vendor has assigned bug ID CSCsw95482 to this vulnerability.

Impact:   A remote user can cause the target device to reload.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

http://tools.cisco.com/security/center/viewAlert.x?alertId=40685

Vendor URL:  tools.cisco.com/security/center/viewAlert.x?alertId=40685 (Links to External Site)
Cause:   State error
Underlying OS:  

Message History:   None.

 

You are receiving this email because you subscribed to this feed at feedmyinbox.com

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions

Diberdayakan oleh Blogger.