The vulnerability is due to incomplete input validation performed on the size of OTV packet header parameters, which can result in a buffer overflow. An attacker could exploit this vulnerability by sending a crafted OTV UDP packet to the OTV interface on an affected device. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or cause a reload of the OTV related process on the affected device.
Cisco has released software updates that address this vulnerability. A workaround to mitigate this vulnerability is available.
This advisory is available at the following link:
http://ift.tt/2dRSgQS
The vulnerability is due to incomplete input validation performed on the size of OTV packet header parameters, which can result in a buffer overflow. An attacker could exploit this vulnerability by sending a crafted OTV UDP packet to the OTV interface on an affected device. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or cause a reload of the OTV related process on the affected device.
Cisco has released software updates that address this vulnerability. A workaround to mitigate this vulnerability is available.
This advisory is available at the following link:
http://ift.tt/2dRSgQS
Security Impact Rating: Critical
CVE: CVE-2016-1453
from Cisco Security Advisory http://ift.tt/2dRSgQS
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.