SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco ASR Router Vendors:   Cisco
Cisco ASR Series IOS-XE Bugs Let Remote Users Deny Service and Execute Arbitrary Code
SecurityTracker Alert ID:  1031981
SecurityTracker URL:  http://securitytracker.com/id/1031981
CVE Reference:   CVE-2015-0639, CVE-2015-0640, CVE-2015-0641, CVE-2015-0644, CVE-2015-0645   (Links to External Site)
Date:  Mar 25 2015
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Cisco ASR 1000, 4400, and 1000v Series
Description:   Multiple vulnerabilities were reported in Cisco IOS-XE on Cisco ASR 1000, 4400, and 1000v Series Routers. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions on the target system.

A remote user can send a large amount of specially crafted (oversized) IP packets that require fragmentation that, when processed by the target network address translation and high-speed logging functions will cause the target device to reload [CVE-2015-0640].

The vendor has assigned bug ID CSCuo25741 to this vulnerability.

A remote user can send a specially crafted TCP packet that requires processing by the target AppNav component to cause the target device to reload or execute arbitrary code on the forwarding engine [CVE-2015-0644].

The vendor has assigned bug ID CSCuo53622 to this vulnerability.

A remote user can send specially crafted IPv6 packets to the target device to cause the target device to reload [CVE-2015-0641].

The vendor has assigned bug ID CSCub68073 to this vulnerability.

A remote user can send multiple specially crafted IPv4 or IPv6 packets that require processing by the Layer 4 Redirect (L4R) processing code on the target device to cause the target device to reload [CVE-2015-0645].

The vendor has assigned bug ID CSCuq59131 to this vulnerability.

A remote user can send multiple specially crafted IPv6 packets encapsulated in IPv4 UDP packets that, when processed by the target system configured with Media Monitoring (MMON) or Network-Based Application Recognition (NBAR) configured, will trigger a flaw in the Common Flow Table (CFT) processing and cause the target device to reload [CVE-2015-0639].

The vendor has assigned bug ID CSCua79665 to this vulnerability.

Cisco 1000 Series Aggregation Services Routers (ASR), 4400 Series Integrated Services Routers (ISR), and 1000v Series Cloud Services Routers (CSR) are affected.

Cisco IOS is not affected.

Cisco IOS XR is not affected.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause denial of service conditions.

Solution:   The vendor has issued a fix.

A patch matrix is available in the vendor's advisory.

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe (Links to External Site)
Cause:   Access control error, Input validation error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC