[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Cisco Security Advisory: Cisco IOS XR for NCS 6000 Packet Timer Leak Denial of Service Vulnerability
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: Cisco Security Advisory: Cisco IOS XR for NCS 6000 Packet Timer Leak Denial of Service Vulnerability
- From: Cisco Systems Product Security Incident Response Team <psirt@xxxxxxxxx>
- Date: Wed, 13 Jul 2016 12:13:38 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco Security Advisory: Cisco IOS XR for NCS 6000 Packet Timer Leak Denial of
Service Vulnerability
Advisory ID: cisco-sa-20160713-ncs6k
Revision 1.0
For Public Release 2016 July 13 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
A vulnerability in the management of system timer resources in Cisco IOS XR for
Cisco Network Convergence System 6000 (NCS 6000) Series Routers could allow an
unauthenticated, remote attacker to cause a leak of system timer resources,
leading to a nonoperational state and an eventual reload of the Route Processor
(RP) on the affected platform.
The vulnerability is due to improper management of system timer resources. An
attacker could exploit this vulnerability by sending a number of Secure Shell
(SSH), Secure Copy Protocol (SCP), and Secure FTP (SFTP) management connections
to an affected device. An exploit could allow the attacker to cause a leak of
system timer resources, leading to a nonoperational state and an eventual
reload of the RP on the affected platform.
Cisco has released software updates that address this vulnerability. There are
no workarounds that mitigate this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160713-ncs6k
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)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=8GIQ
-----END PGP SIGNATURE-----