Lucene search

K
ciscoCiscoCISCO-SA-20110928-IPV6
HistorySep 28, 2011 - 4:00 p.m.

Cisco IOS Software IPv6 Denial of Service Vulnerability

2011-09-2816:00:00
tools.cisco.com
16

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

55.7%

Cisco IOS Software contains a vulnerability in the IP version 6
(IPv6) protocol stack implementation that could allow an
unauthenticated, remote attacker to cause a reload of an affected device
that has IPv6 operation enabled. The vulnerability is triggered when an
affected device processes a malformed IPv6 packet.

Cisco has released software updates that address this vulnerability. There are no workarounds to mitigate this vulnerability.

This advisory is posted at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110928-ipv6[“[[Publication_URL]]”].

Note: The September 28, 2011, Cisco IOS Software
Security Advisory bundled publication includes ten Cisco Security Advisories.
Nine of the advisories address vulnerabilities in Cisco IOS Software, and one
advisory addresses a vulnerability in Cisco Unified Communications Manager.
Each advisory lists the Cisco IOS Software releases that correct the
vulnerability or vulnerabilities detailed in the advisory as well as the Cisco
IOS Software releases that correct all vulnerabilities in the September 2011
Bundled Publication.

Individual publication links are in “Cisco Event Response:
Semiannual Cisco IOS Software Security Advisory Bundled Publication” at the
following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep11.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep11.html”]

Affected configurations

Vulners
Node
ciscoiosMatch12.4t
OR
ciscoiosMatch15.0m
OR
ciscoiosMatch15.0xa
OR
ciscoiosMatch15.1t
OR
ciscoiosMatch15.1xb
OR
ciscoiosMatch15.9m
OR
ciscoiosMatch15.1svs
OR
ciscoiosMatch12.4\(24\)t
OR
ciscoiosMatch12.4\(24\)t3
OR
ciscoiosMatch12.4\(24\)t4
OR
ciscoiosMatch12.4\(24\)t2
OR
ciscoiosMatch12.4\(24\)t1
OR
ciscoiosMatch15.0\(1\)m1
OR
ciscoiosMatch15.0\(1\)m4
OR
ciscoiosMatch15.0\(1\)m3
OR
ciscoiosMatch15.0\(1\)m2
OR
ciscoiosMatch15.0\(1\)m
OR
ciscoiosMatch15.0\(1\)xa2
OR
ciscoiosMatch15.0\(1\)xa4
OR
ciscoiosMatch15.0\(1\)xa1
OR
ciscoiosMatch15.0\(1\)xa3
OR
ciscoiosMatch15.0\(1\)xa
OR
ciscoiosMatch15.0\(1\)xa5
OR
ciscoiosMatch15.1\(2\)t
OR
ciscoiosMatch15.1\(1\)t1
OR
ciscoiosMatch15.1\(2\)t0a
OR
ciscoiosMatch15.1\(1\)t2
OR
ciscoiosMatch15.1\(3\)t
OR
ciscoiosMatch15.1\(2\)t2a
OR
ciscoiosMatch15.1\(1\)t
OR
ciscoiosMatch15.1\(2\)t2
OR
ciscoiosMatch15.1\(2\)t1
OR
ciscoiosMatch15.1\(1\)xb
OR
ciscoiosMatch15.1\(1\)xb3
OR
ciscoiosMatch15.1\(1\)xb1
OR
ciscoiosMatch15.1\(1\)xb2
OR
ciscoiosMatch15.9\(3\)m2
OR
ciscoiosMatch15.1\(3\)svs
VendorProductVersionCPE
ciscoios12.4tcpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*
ciscoios15.0mcpe:2.3:o:cisco:ios:15.0m:*:*:*:*:*:*:*
ciscoios15.0xacpe:2.3:o:cisco:ios:15.0xa:*:*:*:*:*:*:*
ciscoios15.1tcpe:2.3:o:cisco:ios:15.1t:*:*:*:*:*:*:*
ciscoios15.1xbcpe:2.3:o:cisco:ios:15.1xb:*:*:*:*:*:*:*
ciscoios15.9mcpe:2.3:o:cisco:ios:15.9m:*:*:*:*:*:*:*
ciscoios15.1svscpe:2.3:o:cisco:ios:15.1svs:*:*:*:*:*:*:*
ciscoios12.4(24)tcpe:2.3:o:cisco:ios:12.4\(24\)t:*:*:*:*:*:*:*
ciscoios12.4(24)t3cpe:2.3:o:cisco:ios:12.4\(24\)t3:*:*:*:*:*:*:*
ciscoios12.4(24)t4cpe:2.3:o:cisco:ios:12.4\(24\)t4:*:*:*:*:*:*:*
Rows per page:
1-10 of 381

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

55.7%

Related for CISCO-SA-20110928-IPV6