Secunia Advisory: SA29559  
Release Date: 2008-03-27

Critical:
Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch

OS:Cisco 7600 Series 12.x
Cisco Catalyst 6500 Series 12.x
Cisco IOS 12.x
Cisco IOS R12.x


CVE reference:CVE-2008-0537 (Secunia mirror)
Description:
A vulnerability has been reported in certain Cisco devices, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an unspecified error in the handling of certain packets and can be exploited to cause a blocked interface input queue, a memory leak, or a restart of the device.

Successful exploitation requires that the device is configured for Multi Protocol Label Switching (MPLS) Virtual Private Networking (VPN) and Open Shortest Path First (OSPF) sham-link.

The vulnerability is reported in the following products:
* Cisco Catalyst 6500 Series devices with the Sup32, Sup720, Sup720-3B, or Sup720-3BXL
* Cisco 7600 Series devices with the Sup32, Sup720, Sup720-3B, or Sup720-3BXL
* Cisco 7600 Series devices with the RSP720, RSP720-3C, or RSP720-3CXL
* Cisco ME 6524 Ethernet Switch

Solution:
Update to a fixed version (please see the vendor's advisory for details).

Provided and/or discovered by:
Reported to the vendor by a customer.

Original Advisory:
http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml

資料來源 http://secunia.com/advisories/29559/
arrow
arrow
    全站熱搜
    創作者介紹
    創作者 ivan0914 的頭像
    ivan0914

    I'n Blog 之萬象真藏

    ivan0914 發表在 痞客邦 留言(0) 人氣()