SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Cisco Wide Area Application Services Vendors:   Cisco
Cisco Wide Area Application Services TCP Fragment Input Validation Flaw Lets Remote Users Cause the Target WAASNET Process to Reload
SecurityTracker Alert ID:  1038747
SecurityTracker URL:  http://securitytracker.com/id/1038747
CVE Reference:   CVE-2017-6721   (Links to External Site)
Date:  Jun 21 2017
Impact:   Denial of service via network
Vendor Confirmed:  Yes  
Version(s): 6.3(1)
Description:   A vulnerability was reported in Cisco Wide Area Application Services. A remote user can cause the target process to reload.

A remote user can send a series of specially crafted TCP fragments through the target device to trigger an input validation flaw and cause the target WAASNET process to reload. As a result, the target device may drop traffic while the WAASNET process is restarting.

The vendor has assigned bug ID CSCvc57428 to this vulnerability.

Impact:   A remote user can cause the target process to restart, which may cause traffic to be dropped.
Solution:   The vendor has issuerd a fix (6.2(3.22), 6.2(3c)6, 6.3(0.143)).

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-waas

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-waas (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC