You are here
Home > Preporuke > Ranjivost Cisco Prime Access Registrar proizvoda

Ranjivost Cisco Prime Access Registrar proizvoda

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Prime Access Registrar Denial of Service Vulnerability

Advisory ID: cisco-sa-20180905-cpar-dos

Revision: 1.0

For Public Release: 2018 September 5 16:00 GMT

Last Updated: 2018 September 5 16:00 GMT

CVE ID(s): CVE-2018-0421

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary

=======

A vulnerability in TCP connection management in Cisco Prime Access Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition when the application unexpectedly restarts.

The vulnerability is due to incorrect handling of incoming TCP SYN packets to specific listening ports. The improper handling of the TCP SYN packets could cause a system file description to be allocated and not freed. An attacker could exploit this vulnerability by sending a crafted stream of TCP SYN packets to the application. A successful exploit could allow the attacker to cause the application to eventually restart if a file description cannot be obtained.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cpar-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cpar-dos”]

—–BEGIN PGP SIGNATURE—–
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=pHpL
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-09-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivost Cisco Webex Meetings klijenta

Otkrivena je ranjivost u dozvola mapa kod Cisco Webex Meetings uzrokovana dozvolama koje korisnicima omogućavaju čitanje, zapisivanje i izvršavanje Datoteka...

Close