Lucene search

K
ciscoCiscoCISCO-SA-20140326-IPV6
HistoryMar 26, 2014 - 4:00 p.m.

Cisco IOS Software Crafted IPv6 Packet Denial of Service Vulnerability

2014-03-2616:00:00
tools.cisco.com
10

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.0%

A vulnerability in the implementation of the IP version 6 (IPv6) protocol stack in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause I/O memory depletion on an affected device that has IPv6 enabled. The vulnerability is triggered when an affected device processes a malformed IPv6 packet.

Cisco has released software updates that address this vulnerability. There are no workarounds to mitigate this vulnerability.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6”]

Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2014 bundled publication.

Individual publication links are in Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html”]

Affected configurations

Vulners
Node
ciscoiosMatch15.2s
OR
ciscoiosMatch15.3t
OR
ciscoiosMatch15.2m
OR
ciscoiosMatch15.2gc
OR
ciscoiosMatch15.3s
OR
ciscoiosMatch15.2e
OR
ciscoiosMatch15.2jb
OR
ciscoiosMatch15.3m
OR
ciscoiosMatch15.2jn
OR
ciscoiosMatch15.2ey
OR
ciscoiosMatch15.3xb
OR
ciscocisco_iosMatch3.7sxe
OR
ciscocisco_iosMatch3.8sxe
OR
ciscocisco_iosMatch3.9sxe
OR
ciscocisco_iosMatch3.3xoxe
OR
ciscocisco_iosMatch3.5exe
OR
ciscocisco_iosMatch3.10sxe
OR
ciscoiosMatch15.2\(4\)s
OR
ciscoiosMatch15.2\(4\)s1
OR
ciscoiosMatch15.2\(4\)s4
OR
ciscoiosMatch15.2\(4\)s2
OR
ciscoiosMatch15.2\(4\)s3
OR
ciscoiosMatch15.2\(4\)s0c
OR
ciscoiosMatch15.2\(4\)s1c
OR
ciscoiosMatch15.2\(4\)s3a
OR
ciscoiosMatch15.2\(4\)s4a
OR
ciscoiosMatch15.3\(1\)t
OR
ciscoiosMatch15.3\(2\)t
OR
ciscoiosMatch15.3\(1\)t1
OR
ciscoiosMatch15.3\(1\)t2
OR
ciscoiosMatch15.3\(1\)t3
OR
ciscoiosMatch15.3\(2\)t1
OR
ciscoiosMatch15.3\(2\)t2
OR
ciscoiosMatch15.2\(4\)m
OR
ciscoiosMatch15.2\(4\)m1
OR
ciscoiosMatch15.2\(4\)m2
OR
ciscoiosMatch15.2\(4\)m4
OR
ciscoiosMatch15.2\(4\)m3
OR
ciscoiosMatch15.2\(4\)m5
OR
ciscoiosMatch15.2\(4\)gc
OR
ciscoiosMatch15.3\(1\)s
OR
ciscoiosMatch15.3\(2\)s
OR
ciscoiosMatch15.3\(3\)s
OR
ciscoiosMatch15.3\(1\)s2
OR
ciscoiosMatch15.3\(1\)s1
OR
ciscoiosMatch15.3\(2\)s2
OR
ciscoiosMatch15.3\(2\)s1
OR
ciscoiosMatch15.3\(1\)s1e
OR
ciscoiosMatch15.3\(3\)s1
OR
ciscoiosMatch15.3\(3\)s1a
OR
ciscoiosMatch15.2\(1\)e
OR
ciscoiosMatch15.2\(1\)e1
OR
ciscoiosMatch15.2\(4\)jb
OR
ciscoiosMatch15.2\(4\)jb1
OR
ciscoiosMatch15.2\(4\)jb2
OR
ciscoiosMatch15.2\(4\)jb3
OR
ciscoiosMatch15.2\(4\)jb3a
OR
ciscoiosMatch15.3\(3\)m
OR
ciscoiosMatch15.3\(3\)m1
OR
ciscoiosMatch15.2\(4\)jn
OR
ciscoiosMatch15.2\(1\)ey
OR
ciscoiosMatch15.3\(3\)xb12
OR
ciscocisco_iosMatch3.7.0sxe
OR
ciscocisco_iosMatch3.7.1sxe
OR
ciscocisco_iosMatch3.7.2sxe
OR
ciscocisco_iosMatch3.7.3sxe
OR
ciscocisco_iosMatch3.7.4sxe
OR
ciscocisco_iosMatch3.7.4asxe
OR
ciscocisco_iosMatch3.7.2tsxe
OR
ciscocisco_iosMatch3.7.0bsxe
OR
ciscocisco_iosMatch3.7.1asxe
OR
ciscocisco_iosMatch3.8.0sxe
OR
ciscocisco_iosMatch3.8.1sxe
OR
ciscocisco_iosMatch3.8.2sxe
OR
ciscocisco_iosMatch3.9.1sxe
OR
ciscocisco_iosMatch3.9.0sxe
OR
ciscocisco_iosMatch3.9.2sxe
OR
ciscocisco_iosMatch3.9.1asxe
OR
ciscocisco_iosMatch3.9.0asxe
OR
ciscocisco_iosMatch3.3.0xoxe
OR
ciscocisco_iosMatch3.5.0exe
OR
ciscocisco_iosMatch3.5.1exe
OR
ciscocisco_iosMatch3.10.0sxe
OR
ciscocisco_iosMatch3.10.1sxe
OR
ciscocisco_iosMatch3.10.1xbsxe
VendorProductVersionCPE
ciscoios15.2scpe:2.3:o:cisco:ios:15.2s:*:*:*:*:*:*:*
ciscoios15.3tcpe:2.3:o:cisco:ios:15.3t:*:*:*:*:*:*:*
ciscoios15.2mcpe:2.3:o:cisco:ios:15.2m:*:*:*:*:*:*:*
ciscoios15.2gccpe:2.3:o:cisco:ios:15.2gc:*:*:*:*:*:*:*
ciscoios15.3scpe:2.3:o:cisco:ios:15.3s:*:*:*:*:*:*:*
ciscoios15.2ecpe:2.3:o:cisco:ios:15.2e:*:*:*:*:*:*:*
ciscoios15.2jbcpe:2.3:o:cisco:ios:15.2jb:*:*:*:*:*:*:*
ciscoios15.3mcpe:2.3:o:cisco:ios:15.3m:*:*:*:*:*:*:*
ciscoios15.2jncpe:2.3:o:cisco:ios:15.2jn:*:*:*:*:*:*:*
ciscoios15.2eycpe:2.3:o:cisco:ios:15.2ey:*:*:*:*:*:*:*
Rows per page:
1-10 of 851

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.0%