Cisco IOS and IOS XE Software Data in Motion Component Denial of Service Vulnerability
A vulnerability in the Cisco Data in Motion (DMo) component for Cisco IOS and IOS XE Software with the IOx feature set could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition for the DMo process on a targeted system.
The vulnerability is due to insufficient bounds checks by the affected component. An attacker could exploit this vulnerability by sending crafted traffic to a targeted system for processing by the affected component. A successful exploit could allow the attacker to cause a partial DoS condition for the affected component on the targeted system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2cVbnEv A vulnerability in the Cisco Data in Motion (DMo) component for Cisco IOS and IOS XE Software with the IOx feature set could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition for the DMo process on a targeted system.
The vulnerability is due to insufficient bounds checks by the affected component. An attacker could exploit this vulnerability by sending crafted traffic to a targeted system for processing by the affected component. A successful exploit could allow the attacker to cause a partial DoS condition for the affected component on the targeted system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2cVbnEv
Security Impact Rating: Medium
CVE: CVE-2016-6409
from Cisco Security Advisory http://ift.tt/2cVbnEv
The vulnerability is due to insufficient bounds checks by the affected component. An attacker could exploit this vulnerability by sending crafted traffic to a targeted system for processing by the affected component. A successful exploit could allow the attacker to cause a partial DoS condition for the affected component on the targeted system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2cVbnEv A vulnerability in the Cisco Data in Motion (DMo) component for Cisco IOS and IOS XE Software with the IOx feature set could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition for the DMo process on a targeted system.
The vulnerability is due to insufficient bounds checks by the affected component. An attacker could exploit this vulnerability by sending crafted traffic to a targeted system for processing by the affected component. A successful exploit could allow the attacker to cause a partial DoS condition for the affected component on the targeted system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2cVbnEv
Security Impact Rating: Medium
CVE: CVE-2016-6409
from Cisco Security Advisory http://ift.tt/2cVbnEv