Cisco IOS Packets Handling Remote Code Execution and Denial of Service Vulnerabilities
which could be exploited by remote attackers to cause a denial of service or compromise an affected device.

The first issue is due to an error when handling Internet Control Message Protocol (ICMP) packets, Protocol Independent Multicast version 2 (PIMv2) packets, Pragmatic General Multicast (PGM) packets, or URL Rendezvous Directory (URD) packets with a header containing a specially crafted IP option, which could be exploited by remote attackers to reload a vulnerable device or execute arbitrary commands.

The second vulnerability is due to a memory leak in the Transmission Control Protocol (TCP) listener when processing specially crafted packets sent to an IPv4 address assigned to a physical or virtual interface on a device, which could be exploited by attackers to exhaust all available memory resources, creating a denial of service condition.

The third issue is due to an error when processing specially crafted IPv6 Type 0 Routing headers, which could be exploited by attackers to crash a vulnerable device

Affected Products

Cisco IOS versions 9.x
Cisco IOS versions 10.x
Cisco IOS versions 11.x
Cisco IOS versions 12.x
Cisco IOS XR versions 2.0.x
Cisco IOS XR versions 3.0.x
Cisco IOS XR versions 3.2.x

Solution

Upgrade to a fixed version :
http://www.cisco.com/warp/public/707/cisco-sa-20070124-bundle.shtml

더보기

댓글,