CERT mailing list archives

Cisco IOS XR Denial-of-Service Vulnerability


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Thu, 11 Jun 2015 17:06:06 -0500

NCCIC / US-CERT

National Cyber Awareness System:

Cisco IOS XR Denial-of-Service Vulnerability [ 
https://www.us-cert.gov/ncas/current-activity/2015/06/11/Cisco-IOS-XR-Denial-Service-Vulnerability ] 06/11/2015 05:24 
PM EDT 
Original release date: June 11, 2015

Cisco has identified a vulnerability that could allow an unauthenticated remote attacker to cause a denial-of-service 
condition. The vulnerability is due to improper processing of malformed IPv6 packets carrying extension headers. A 
Cisco Carrier Routing System 3 (CRS-3) running a version of Cisco IOS XR software prior to 4.2.1 is affected by this 
vulnerability.

Users and administrators are encouraged to review the Cisco Security Advisory [ 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150611-iosxr ] and apply the necessary 
updates.

________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ] 

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: