First published: Thu Aug 18 2011(Updated: )
Cisco IOS 12.2, 12.3, 12.4, 15.0, and 15.1, when the data-link switching (DLSw) feature is configured, allows remote attackers to cause a denial of service (device crash) by sending a sequence of malformed packets and leveraging a "narrow timing window," aka Bug ID CSCtf74999, a different vulnerability than CVE-2007-0199, CVE-2008-1152, and CVE-2009-0629.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.1 | |
Cisco IOS | =15.0 | |
Cisco IOS | =12.3 | |
Cisco IOS | =12.4 | |
Cisco IOS | =12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1625 is classified as a high severity vulnerability that can lead to a denial of service.
To fix CVE-2011-1625, it is recommended to upgrade to a vulnerable-free version of Cisco IOS.
CVE-2011-1625 affects Cisco IOS versions 12.2, 12.3, 12.4, 15.0, and 15.1.
CVE-2011-1625 enables remote attackers to cause a denial of service by sending malformed packets.
There are no known workarounds for CVE-2011-1625, and upgrading is the recommended approach.