Lucene search

K
ciscoCiscoCISCO-SA-20150619-CVE-2015-4201
HistoryJun 19, 2015 - 7:09 p.m.

Cisco Gateway GPRS Support Node TCP Invalid Packet Vulnerability

2015-06-1919:09:59
tools.cisco.com
10

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.003

Percentile

65.8%

A vulnerability in the TCP packet input handler of the Cisco Gateway GPRS Support Node (GGSN) could allow an unauthenticated, remote attacker to cause a reset of the Session Manager application.

The vulnerability is due to improper input validation of the length fields of the TCP/IP header. An attacker could exploit this vulnerability by sending a crafted TCP packet with an invalid TCP/IP header. A successful exploit could allow the attacker to cause the Session Manager application on an affected device to restart, resulting in a DoS condition.

Cisco has confirmed the vulnerability and released software updates.

To exploit this vulnerability, the attacker must send a crafted TCP packet with an invalid TCP/IP header to the targeted system, making exploitation more difficult in environments that restrict network access from untrusted sources.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoasr_5000_series_softwareMatchany
OR
ciscoasr_9904Match5000_series_software
VendorProductVersionCPE
ciscoasr_5000_series_softwareanycpe:2.3:a:cisco:asr_5000_series_software:any:*:*:*:*:*:*:*
ciscoasr_99045000_series_softwarecpe:2.3:h:cisco:asr_9904:5000_series_software:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.003

Percentile

65.8%

Related for CISCO-SA-20150619-CVE-2015-4201