Cisco ASR 1000 Series Router UDP Packet Processing Flaw Lets Remote Users Cause the Target Service to Crash : 8/28/2015 5:38:04 AM
This eBook shows you how to build great push messages that convert for your app. From our sponsors |
| Vulnerability Databse |
| This module replaces the description field of a feed to the page it links to (in addition, it wipes out the content:encoded field), so you can get its full text. |
Cisco ASR 1000 Series Router UDP Packet Processing Flaw Lets Remote Users Cause the Target Service to Crash
8/28/2015 12:00:00 AM
| Cisco ASR 1000 Series Router UDP Packet Processing Flaw Lets Remote Users Cause the Target Service to Crash |
| SecurityTracker Alert ID: 1033406 |
| SecurityTracker URL: http://securitytracker.com/id/1033406 |
| CVE Reference: CVE-2015-6268 (Links to External Site) |
| Date: Aug 28 2015 |
| Impact: Denial of service via network |
| Fix Available: Yes Vendor Confirmed: Yes |
| Version(s): ASR 1000 Series Routers; prior to 2.2.3 and prior to 2.3.0 |
| Description: A vulnerability was reported in Cisco ASR 1000 Series Routers. A remote user can cause the target service to crash. A remote user can send a specially crafted UDP packet via IPv4 to the target device to cause the Embedded Services Processor (ESP) processing the packet to crash and the device to reload. The vendor has assigned bug ID CSCsw95482 to this vulnerability. |
| Impact: A remote user can cause the target device to reload. |
| Solution: The vendor has issued a fix. The vendor's advisory is available at: http://tools.cisco.com/security/center/viewAlert.x?alertId=40685 |
| Vendor URL: tools.cisco.com/security/center/viewAlert.x?alertId=40685 (Links to External Site) |
| Cause: State error |
| Underlying OS: |
| |
| Message History: None. |
You are receiving this email because you subscribed to this feed at feedmyinbox.com
If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions
Diberdayakan oleh Blogger.