SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Intrusion Detection)  >   Cisco Intrusion Prevention System Vendors:   Cisco
Cisco Intrusion Prevention System Can Be Crashed By Remote Users
SecurityTracker Alert ID:  1016474
SecurityTracker URL:  http://securitytracker.com/id/1016474
CVE Reference:   CVE-2006-3596   (Links to External Site)
Updated:  Jul 18 2008
Original Entry Date:  Jul 12 2006
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 42xx appliances; 5.1(1) and other 5.1 versions
Description:   A vulnerability was reported in Cisco Intrusion Prevention System. A remote user can cause denial of service conditions.

The custom device driver for Intel-based gigabit network adapters used in certain IPS devices contains a vulnerability. A remote user can send specially crafted data to cause a kernel panic on the target device. The device will stop all processing and will become inaccessible.

A power reset is required to return the IPS device to normal operations.

Cisco Intrusion Prevention System 42xx appliances running IPS software versions 5.1(1), 5.1(1a), 5.1(1b), 5.1(1c), 5.1(1d), 5.1(1e), or 5.1(p1) are affected. The following devices may be vulnerable:

IDS-4235
IPS-4240
IDS-4250-SX
IDS-4250-TX
IDS-4250-XL (4250 with XL accelerator card)
IPS-4255

Cisco has assigned Cisco bug ID CSCsd36590 to this vulnerability.

Impact:   A remote user can cause the device to stop processing.
Solution:   Cisco has issued a fixed version (5.1(2)), available at:

http://www.cisco.com/pcgi-bin/tablebuild.pl/ips5

The Cisco advisory is available at:

http://www.cisco.com/warp/public/707/cisco-sa-20060712-ips.shtml

Vendor URL:  www.cisco.com/warp/public/707/cisco-sa-20060712-ips.shtml (Links to External Site)
Cause:   Exception handling error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC