Cisco ASR 9000 Series Router vty Session Closing Bug Lets Local Users Consume Excessive Memory Resources
|
SecurityTracker Alert ID: 1033259 |
SecurityTracker URL: http://securitytracker.com/id/1033259
|
CVE Reference:
CVE-2015-4277
(Links to External Site)
|
Date: Aug 12 2015
|
Impact:
Denial of service via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): ASR 9000 Series; 5.1.3, 5.3.0
|
Description:
A vulnerability was reported in Cisco ASR 9000 Series Routers. A local user can consume excessive memory on the target system.
A local user can exploit a flaw in the closing of vty sessions to create an excessive number of 'tmp/*config' files and consume excessive memory resources on the system. As a result, the system will become unresponsive.
The vendor has assigned bug ID CSCut93842 to this vulnerability.
|
Impact:
A local user can consume excessive memory resources to cause the target system to become unresponsive.
|
Solution:
The vendor has issued a fix.
The vendor's advisory is available at:
http://tools.cisco.com/security/center/viewAlert.x?alertId=39939
|
Vendor URL: tools.cisco.com/security/center/viewAlert.x?alertId=39939 (Links to External Site)
|
Cause:
Resource error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|