The vulnerability is due to improper input validation of user-supplied fields when logging in using FTP. An attacker could exploit this vulnerability by opening an FTP connection to the targeted device and crafting user-supplied parameters. An exploit could allow the attacker to cause a partial DoS condition when the FTP process unexpectedly quits. This vulnerability does not impact other user traffic.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2eGvpUC
The vulnerability is due to improper input validation of user-supplied fields when logging in using FTP. An attacker could exploit this vulnerability by opening an FTP connection to the targeted device and crafting user-supplied parameters. An exploit could allow the attacker to cause a partial DoS condition when the FTP process unexpectedly quits. This vulnerability does not impact other user traffic.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2eGvpUC
Security Impact Rating: Medium
CVE: CVE-2016-6358
from Cisco Security Advisory http://ift.tt/2eGvpUC
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.