SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco Catalyst Switch Vendors:   Cisco
Cisco Catalyst 4500 Series Switch Cisco Discovery Packet Processing Flaw Lets Remote Users on the Local Network Cause the Target Service to Stop Functioning
SecurityTracker Alert ID:  1033612
SecurityTracker URL:  http://securitytracker.com/id/1033612
CVE Reference:   CVE-2015-6294   (Links to External Site)
Date:  Sep 18 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4500 Series; IOS XE 3.6(2)E and prior, IOS 15.2(3)E and prior
Description:   A vulnerability was reported in Cisco Catalyst 4500 Series Switch. A remote user on the local network can cause the target service to stop functioning.

A remote user on the local network can send specially crafted Cisco Discovery Protocol packets to cause the target Cisco Discovery Protocol packet process to stop functioning.

The vendor has assigned bug ID CSCuu25770 to this vulnerability.

Impact:   A remote user on the local network can cause the target service to stop functioning.
Solution:   Cisco has issued a fix.

The Cisco advisory is available at:

http://tools.cisco.com/security/center/viewAlert.x?alertId=41006

Vendor URL:  tools.cisco.com/security/center/viewAlert.x?alertId=41006 (Links to External Site)
Cause:   State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC