[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Cisco Security Advisory: Cisco IOS XR Software Route Processor Denial of Service Vulnerability
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Cisco Security Advisory: Cisco IOS XR Software Route Processor Denial of Service Vulnerability
- From: Cisco Systems Product Security Incident Response Team <psirt@xxxxxxxxx>
- Date: Wed, 23 Oct 2013 12:14:03 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Cisco IOS XR Software Route Processor Denial of Service Vulnerability
Advisory ID: cisco-sa-20131023-iosxr
Revision 1.0
For Public Release 2013 October 23 16:00 UTC (GMT)
======================================================================
Summary
- -------
Cisco IOS XR Software contains a vulnerability when handling fragmented packets
that may result in a denial of service condition of the Cisco CRS Route
Processor cards listed under "Affected Products". The vulnerability affects
IOS XR Software versions 3.3.0 to 4.2.0
The vulnerability is a result of improper handing of fragmented packets and
could cause the route processor, which processes the packets, to be unable to
transmit packets to the fabric.
Customers that are running version 4.2.1 or later of Cisco IOS XR Software, or
that have previously installed the SMU for CSCtz62593 are not affected by this
vulnerability.
Cisco has released free software updates that address these vulnerabilities.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-iosxr
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlJn58UACgkQUddfH3/BbTrv4QEAh+QY4ZydQisX8dgb64PnLJ4T
ojL0gqnAyhJyjmlTfQQA/3gUxnSomEgEvh1N1T8OD5oWRTJn/FdI+B8w0wr+9TDN
=GDEc
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/