SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco IOS Vendors:   Cisco
Cisco IOS XE IGMP Processing Flaw Lets Remote Users on the Local Network Consume Excessive Buffer Resources
SecurityTracker Alert ID:  1040592
SecurityTracker URL:  http://securitytracker.com/id/1040592
CVE Reference:   CVE-2018-0165   (Links to External Site)
Date:  Mar 28 2018
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco IOS XE. A remote user can consume excessive buffers on the target system.

A remote user on the local network can send a large number of Internet Group Management Protocol (IGMP) Membership Query packets to consume all available buffers and cause denial of service conditions on the target system.

A manual reload is required to return the system to normal operations.


The vendor has assigned bug IDs CSCuw09295 and CSCve94496 to this vulnerability.

Impact:   A remote user can cause denial of service conditions on the target system.

A manual reload is required to return the system to normal operations.

Solution:   The vendor has issued a fix.

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp (Links to External Site)
Cause:   Resource error

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 28 2018 (Cisco Issues Fix for Cisco Catalyst Switch) Cisco IOS XE IGMP Processing Flaw Lets Remote Users on the Local Network Consume Excessive Buffer Resources
Cisco has issued a fix for Cisco Catalyst Switch.



 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC