The vulnerability is due to improper processing of IPv6 Neighbor Discovery (ND) packets. An attacker could exploit this vulnerability by sending a number of IPv6 ND packets to be processed by an affected device. An exploit could allow the attacker to cause a memory leak in the software forwarding queue that would eventually lead to a partial DoS service condition.
Workarounds that address this vulnerability are available.
This advisory is available at the following link: http://ift.tt/2k02v3Z
The vulnerability is due to improper processing of IPv6 Neighbor Discovery (ND) packets. An attacker could exploit this vulnerability by sending a number of IPv6 ND packets to be processed by an affected device. An exploit could allow the attacker to cause a memory leak in the software forwarding queue that would eventually lead to a partial DoS service condition.
Workarounds that address this vulnerability are available.
This advisory is available at the following link: http://ift.tt/2k02v3Z
Security Impact Rating: Medium
CVE: CVE-2017-3803
from Cisco Security Advisory http://ift.tt/2k02v3Z
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.