Secunia Advisory: | SA29559 | |
Release Date: | 2008-03-27 | |
Critical: | Moderately critical | |
Impact: | DoS | |
Where: | From remote | |
Solution Status: | Vendor Patch | |
OS: | Cisco 7600 Series 12.x Cisco Catalyst 6500 Series 12.x Cisco IOS 12.x Cisco IOS R12.x | |
CVE reference: | CVE-2008-0537 (Secunia mirror) |
A vulnerability has been reported in certain Cisco devices, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an unspecified error in the handling of certain packets and can be exploited to cause a blocked interface input queue, a memory leak, or a restart of the device.
Successful exploitation requires that the device is configured for Multi Protocol Label Switching (MPLS) Virtual Private Networking (VPN) and Open Shortest Path First (OSPF) sham-link.
The vulnerability is reported in the following products:
* Cisco Catalyst 6500 Series devices with the Sup32, Sup720, Sup720-3B, or Sup720-3BXL
* Cisco 7600 Series devices with the Sup32, Sup720, Sup720-3B, or Sup720-3BXL
* Cisco 7600 Series devices with the RSP720, RSP720-3C, or RSP720-3CXL
* Cisco ME 6524 Ethernet Switch
Solution:
Update to a fixed version (please see the vendor's advisory for details).
Provided and/or discovered by:
Reported to the vendor by a customer.
Original Advisory:
http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml
資料來源 http://secunia.com/advisories/29559/
全站熱搜
留言列表