First published: Tue May 31 2011(Updated: )
Cisco IOS XR 3.9.x and 4.0.x before 4.0.3 and 4.1.x before 4.1.1, when an SPA interface processor is installed, allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 packet, aka Bug ID CSCto45095.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 | =3.9.0 | |
Cisco IOS XRv 9000 | =3.9.2 | |
Cisco IOS XRv 9000 | =3.9.1 | |
Cisco IOS XRv 9000 | =4.0.2 | |
Cisco IOS XRv 9000 | =4.1 | |
Cisco IOS XRv 9000 | =4.0.1 | |
Cisco IOS XRv 9000 | =4.0.0 | |
Cisco IOS XRv 9000 | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1651 is classified as a high severity vulnerability that can lead to a denial of service due to device reloads.
To fix CVE-2011-1651, update Cisco IOS XR to version 4.0.3 or later for 4.0.x, or 4.1.1 or later for 4.1.x.
CVE-2011-1651 affects Cisco IOS XR versions 3.9.x up to 3.9.2, 4.0.x up to 4.0.2, and 4.1.x up to 4.1.0.
CVE-2011-1651 involves remote attackers sending crafted IPv4 packets to cause a device reload.
Yes, CVE-2011-1651 is specific to Cisco devices running IOS XR when an SPA interface processor is installed.