Cisco IOS IPsec IKE畸形报文远程拒绝服务漏洞

漏洞起因
异常条件处理失败错误
危险等级

 
影响系统
Cisco IOS 12.4XT
Cisco IOS 12.4XP
Cisco IOS 12.4XJ
Cisco IOS 12.4XE
Cisco IOS 12.4XD
Cisco IOS 12.4XC
Cisco IOS 12.4XB
Cisco IOS 12.4T
Cisco IOS 12.4
Cisco IOS 12.3ZA
Cisco IOS 12.3YZ
Cisco IOS 12.3YX
Cisco IOS 12.3YU
Cisco IOS 12.3YS
Cisco IOS 12.3YQ
Cisco IOS 12.3YK
Cisco IOS 12.3YG
Cisco IOS 12.3YF
Cisco IOS 12.3XX
Cisco IOS 12.3XW
Cisco IOS 12.3XU
Cisco IOS 12.3XR
Cisco IOS 12.3XJ
Cisco IOS 12.3XE
Cisco IOS 12.3TPC
Cisco IOS 12.3T
Cisco IOS 12.3JK
Cisco IOS 12.2XNF
Cisco IOS 12.2XNE
Cisco IOS 12.2XND
Cisco IOS 12.2XNC
Cisco IOS 12.2XNB
Cisco IOS 12.2XNA
Cisco IOS 12.2SRA
Cisco IOS 12.2SCB
Cisco IOS 12.2SCA
Cisco IOS 12.2SB
 
不受影响系统
Cisco IOS 15.0M
Cisco IOS 15.0(1)M2
Cisco IOS 15.0(1)M1
Cisco IOS 12.4XN
Cisco IOS 12.4(25b)
Cisco IOS 12.4(15)T
Cisco IOS 12.4(11)XJ4
Cisco IOS 12.3(8)JK1
Cisco IOS 12.3(4)TPC11a
Cisco IOS 12.3(2)JK3
Cisco IOS 12.3(11)YZ1
Cisco IOS 12.3(11)YK1
Cisco IOS 12.2(33)SRA6
Cisco IOS 12.2(33)SCC1
Cisco IOS 12.2(33)SCB6
Cisco IOS 12.2(33)SB5
Cisco IOS 12.2(31)SB18
 
危害
远程攻击者可以利用漏洞使设备重载。
 
攻击所需条件
攻击者必须访问Cisco IOS。
 
漏洞信息
Cisco IOS是一款流行的Internet操作系统。
Cisco IOS实现的IKE在处理进行报文时存在安全问题,允许运行Cisco IOS软件的设备重载。
运行安装了VPN加速模块2+ (VAM2+)的Cisco IOS软件的设备受此漏洞影响。
 
测试方法
 
厂商解决方案
用户可参考如下供应商提供的安全公告获得补丁信息:
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b20ee5.shtml#@ID
 
漏洞提供者
Cisco

发表评论?

0 条评论。

发表评论