You are here
Home > Preporuke > Ranjivost Cisco VDS-TV uređaja

Ranjivost Cisco VDS-TV uređaja

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Videoscape Distribution Suite Cache Server Denial of Service Vulnerability

Advisory ID: cisco-sa-20170802-vds

Revision: 1.0

For Public Release: 2017 August 2 16:00 GMT

Last Updated: 2017 August 2 16:00 GMT

CVE ID(s): CVE-2017-6745

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary
=======
A vulnerability in the cache server within Cisco Videoscape Distribution Suite (VDS) for Television could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted appliance.

The vulnerability is due to excessive mapped connections exhausting the allotted resources within the system. An attacker could exploit this vulnerability by sending large amounts of inbound traffic to a device with the intention of overloading certain resources. A successful exploit could cause the device to reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-vds [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-vds”]

—–BEGIN PGP SIGNATURE—–
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=2MI6
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-08-0016-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa webkit2gtk

Otkriveni su sigurnosni nedostaci u programskom paketu webkit2gtk za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izvođenje XSS...

Close