Executive Summary
Summary | |
---|---|
Title | Cisco IOS Software for Cisco Integrated Services Routers Generation 2 Denial of Service Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20170927-rbip-dos | First vendor Publication | 2017-09-27 |
Vendor | Cisco | Last vendor Modification | 2017-09-27 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.1 | Attack Range | Adjacent network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 6.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos"] This advisory is part of the September 27, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-63410"]. BEGIN PGP SIGNATURE iQKBBAEBAgBrBQJZy82LZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHkgAA//Tn6EufpLpcmcb1ce 2oM9tDS59awVWnHPlol2UoB3I7Rk9DsJVC5A/kg/Rzf93pLxla8sI/xy/+ibi++4 Z1qFaZg71qcp1myfg1VZJMgT/EeeoD86hMaB+fI9h+7r2+NRlYuctraM4UeLqMxD gx63DB5apx7ErekPIt41QMfUPZF1DNUkEa2Ivmm+ixSfEqwnRFWdZN/GWtcbwQQl RjPs5HVEL8KZeS1wmB+2CRGQTCTwF5obPHNW0Qc21kE0V71bm6sDHBsJGfUNMkea 6c8FTmBwQs2Mg3ppnDLxFXJ1LeNx94xmsMs9xF+NuDZoDjJF6jxM95pwfIcotudp De+2lrz0K9iTiYLfvbZwxCeuJ/3Ga8gAeD+KQQye/PB3JYtkvJDyCEFckMliWhKj eCsV8PD2Mg2ieKws5zz/DlbLYD4Lwj8VA72xgu1BNLTehFMG8PY8bVVZPsP8tWOK u5TkYO7WAl7EX6AjlXMc+26fgho8QzCHS7Z2tuhRHNlKVkTEr7I7OrWWrGPAzWCa 5e0W9n9J/ToCbbR2RYb6zf64eb+x+WucVGHu2/wKZa+fVMAIElAaZYdQ9A3l7j1f CWUgxlKXgrvffrFCgCIauYdAqQ2Giq+yPn7OfgwGzBswZXmbfMt9J/Dl5w0p+Cey GLfQyqeSwmaH+UzykontXoUAfh0= =PHoo END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-10-05 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20170927-rbip-dos.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-10-07 00:24:30 |
|
2017-10-06 13:25:09 |
|
2017-09-29 09:26:02 |
|
2017-09-27 21:23:11 |
|