SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco Application Control Engine Vendors:   Cisco
Cisco Application Control Engine SSL/TLS Input Validation Flaw Lets Remote Users Cause the Target Device to Reload
SecurityTracker Alert ID:  1036748
SecurityTracker URL:  http://securitytracker.com/id/1036748
CVE Reference:   CVE-2016-6399   (Links to External Site)
Date:  Sep 8 2016
Impact:   Denial of service via network
Vendor Confirmed:  Yes  
Version(s): ACE30, ACE 4710
Description:   A vulnerability was reported in Cisco Application Control Engine. A remote user can cause the target device to reload.

A remote user can send specially crafted SSL/TLS packets to the target device to cause the target device to reload.

The Cisco ACE 4710 Application Control Engine appliance and the Cisco ACE30 Application Control Engine Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers are affected.

The vendor has assigned bug ID CSCvb16317 to this vulnerability.

Impact:   A remote user can cause the target device to reload.
Solution:   No solution was available at the time of this entry.

The vendor plans to issue a fix.

The vendor advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160908-ace (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC