You are here
Home > Preporuke > Nadogradnja za veći broj Cisco programskih paketa

Nadogradnja za veći broj Cisco programskih paketa

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Multiple Cisco Products Disk Utilization Denial of Service Vulnerability

Advisory ID: cisco-sa-20180606-diskdos

Revision: 1.0

For Public Release: 2018 June 6 16:00 GMT

Last Updated: 2018 June 6 16:00 GMT

CVE ID(s): CVE-2017-6779

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary

=======

Multiple Cisco products are affected by a vulnerability in local file management for certain system log files of Cisco collaboration products that could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition.

The vulnerability occurs because a certain system log file does not have a maximum size restriction. Therefore, the file is allowed to consume the majority of available disk space on the appliance. An attacker could exploit this vulnerability by sending crafted remote connection requests to the appliance. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the application functions could operate abnormally, making the appliance unstable.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-diskdos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-diskdos”]

—–BEGIN PGP SIGNATURE—–

iQJ5BAEBAgBjBQJbGAY6XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50
IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly
dEBjaXNjby5jb20+AAoJEJa12PPJBfczDRsQAMBtXM4Q4eWqghESnV7dkba+xrYT
LJEqrnsV6NCupJ/PIWXjuoYjgsX2m7NHzo6N3vZFcZgQ28cZNAaTtTJ/spbsLfU5
SlgAPHIPeSbOEXZm3PQV4Ft5roXWimMfX+LLljcJVbqFMVK1dbl8XG51ss78lX2u
P2lzjVne2Adx9zedLIeGNm/i5mg8LUUjjxFiwY+LN+Idpq7H+Vl6k+l5IpXU/XJy
ohueZ9I3HpljERzMlKhRjaUPxMLLI8iAfJ1KRDrbjSpxKTQBv36E+4zlXl/NNzhO
eQLkD495vlq5dXsR5TCWRoaMYWwG5UD+aPvlGcs5+5L+cG1TdfPBtwFeLnC/lRB+
am6fRNbDAWkPnms5Zi0/7g+V9O/UzB0/f13854pOb3ANUJFUNN08HpmFCSuel5+p
44RuaHmmnUtFdLwMOKms3Q7udFsNjPVoD6/6YrKNK6Mf8nOkKSy6Bt1r5iWZLq13
ar49d6pbuMM7/EdHYzH8k2e6Bd5F6JrqqRsOu69/z2KUIB6EHf6vtn5+LyTy/GY/
U3/LnIQCLTl6jVaVmW35gStVpD31CSu1gWl0AEmU5LDApp7gGVM+HGt8eo8dB9n6
jOL1U0IMkdC/SMZ/5PXB1GxMvY1BjLxgC9Y2VEGbYeEldf+MnAc5n5F70Z2HNETt
wMJm2NJOV02AahTn
=Ahps
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorVlatka Misic
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa remctl

Otkriven je sigurnosni nedostatak u programskom paketu remctl za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje rušenje servisa ili...

Close