First published: Sun Jan 22 2006(Updated: )
Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet AP1100 | ||
Cisco Aironet AP1130AG | ||
Cisco Aironet AP1200 | ||
Cisco Aironet AP1230AG | ||
Cisco Aironet AP1240AG | ||
Cisco Aironet AP1300 | ||
Cisco Aironet AP1400 | ||
Cisco Aironet AP350 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0354 is classified as a denial of service vulnerability.
To mitigate CVE-2006-0354, upgrade to a Cisco IOS version that is patched against this vulnerability.
CVE-2006-0354 affects various Cisco Aironet Wireless Access Points including models AP1100, AP1130AG, AP1200, AP1230AG, AP1240AG, AP1300, AP1400, and AP350.
The impact of CVE-2006-0354 includes potential denial of service, leading to termination of packet passing or client connections.
CVE-2006-0354 can be exploited by remote authenticated users sending large numbers of spoofed ARP packets.