First published: Fri Jan 07 2011(Updated: )
The Neighbor Discovery (ND) protocol implementation in the IPv6 stack on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(3) and earlier, and Cisco PIX Security Appliances devices, allows remote attackers to cause a denial of service (CPU consumption and device hang) by sending many Router Advertisement (RA) messages with different source addresses, as demonstrated by the flood_router6 program in the thc-ipv6 package, aka Bug ID CSCti24526.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Adaptive Security Appliance Software | <=8.2\(3\) | |
Cisco Adaptive Security Appliance Software | =7.0 | |
Cisco Adaptive Security Appliance Software | =7.0\(0\) | |
Cisco Adaptive Security Appliance Software | =7.0\(2\) | |
Cisco Adaptive Security Appliance Software | =7.0\(4\) | |
Cisco Adaptive Security Appliance Software | =7.0\(5\) | |
Cisco Adaptive Security Appliance Software | =7.0\(5.2\) | |
Cisco Adaptive Security Appliance Software | =7.0\(6.7\) | |
Cisco Adaptive Security Appliance Software | =7.0.1 | |
Cisco Adaptive Security Appliance Software | =7.0.1.4 | |
Cisco Adaptive Security Appliance Software | =7.0.2 | |
Cisco Adaptive Security Appliance Software | =7.0.4 | |
Cisco Adaptive Security Appliance Software | =7.0.4.3 | |
Cisco Adaptive Security Appliance Software | =7.0.5 | |
Cisco Adaptive Security Appliance Software | =7.0.6 | |
Cisco Adaptive Security Appliance Software | =7.0.7 | |
Cisco Adaptive Security Appliance Software | =7.0.8 | |
Cisco Adaptive Security Appliance Software | =7.0.8-interim | |
Cisco Adaptive Security Appliance Software | =7.1 | |
Cisco Adaptive Security Appliance Software | =7.1\(2\) | |
Cisco Adaptive Security Appliance Software | =7.1\(2.5\) | |
Cisco Adaptive Security Appliance Software | =7.1\(2.27\) | |
Cisco Adaptive Security Appliance Software | =7.1\(2.48\) | |
Cisco Adaptive Security Appliance Software | =7.1\(2.49\) | |
Cisco Adaptive Security Appliance Software | =7.1\(5\) | |
Cisco Adaptive Security Appliance Software | =7.1.1 | |
Cisco Adaptive Security Appliance Software | =7.1.2 | |
Cisco Adaptive Security Appliance Software | =7.2 | |
Cisco Adaptive Security Appliance Software | =7.2\(1\) | |
Cisco Adaptive Security Appliance Software | =7.2\(1.22\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.5\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.7\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.8\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.10\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.14\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.15\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.16\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.17\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.18\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.19\) | |
Cisco Adaptive Security Appliance Software | =7.2\(2.48\) | |
Cisco Adaptive Security Appliance Software | =7.2.1 | |
Cisco Adaptive Security Appliance Software | =7.2.2 | |
Cisco Adaptive Security Appliance Software | =7.2.3 | |
Cisco Adaptive Security Appliance Software | =7.2.4 | |
Cisco Adaptive Security Appliance Software | =7.2.5 | |
Cisco Adaptive Security Appliance Software | =8.0 | |
Cisco Adaptive Security Appliance Software | =8.0.2 | |
Cisco Adaptive Security Appliance Software | =8.0.3 | |
Cisco Adaptive Security Appliance Software | =8.0.4 | |
Cisco Adaptive Security Appliance Software | =8.0.5 | |
Cisco Adaptive Security Appliance Software | =8.2\(1\) | |
Cisco Adaptive Security Appliance Software | =8.2\(2\) | |
Cisco Adaptive Security Appliance Software | =8.2.1 | |
Cisco Adaptive Security Appliance Software | =8.2.2 | |
Cisco Adaptive Security Appliance Software | =8.2.2-interim | |
Cisco 5500 Series Adaptive Security Appliance | ||
Cisco ASA 5500 | ||
Cisco PIX security appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.