SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Device (Router/Bridge/Hub)  >   Cisco ASR Router Vendors:   Cisco
Cisco ASR 9000 Series Router IOS XR IPv6 Packet Processing Flaw Lets Remote Users Cause the Target System to Reload
SecurityTracker Alert ID:  1040315
SecurityTracker URL:  http://securitytracker.com/id/1040315
CVE Reference:   CVE-2018-0136   (Links to External Site)
Date:  Feb 1 2018
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9000 Series; IOS XR 5.3.4
Description:   A vulnerability was reported in Cisco ASR 9000 Series Router. A remote user can cause the target system to reload.

A remote user can send specially crafted IPv6 packets with a fragment header extension to or through the target Trident-based line card to cause the line card to reload.

Systems with Trident-based line cards that have IPv6 configured are affected.

The following Trident-based line cards are affected:

A9K-40GE-L
A9K-40GE-B
A9K-40GE-E
A9K-4T-L
A9K-4T-B
A9K-4T-E
A9K-8T/4-L
A9K-8T/4-B
A9K-8T/4-E
A9K-2T20GE-L
A9K-2T20GE-B
A9K-2T20GE-E
A9K-8T-L
A9K-8T-B
A9K-8T-E
A9K-16/8T-B

The vendor has assigned bug ID CSCvg46800 to this vulnerability.

Impact:   A remote user can cause the target line card to reload.
Solution:   The vendor has issued a fix (Service Pack 7 for Cisco IOS XR Software Release 5.3.4).

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180131-ipv6

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180131-ipv6 (Links to External Site)
Cause:   State error

Message History:   None.


 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180131-ipv6

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC