First published: Sun Mar 03 2013(Updated: )
The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and earlier does not properly manage buffers, which allows remote attackers to cause a denial of service (device reload) via crafted HTTP requests, aka Bug ID CSCuc62460.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Access Point Software | =7.3 | |
Cisco Access Point Software | =7.4 | |
Cisco Access Point Software | =12.4 | |
Cisco Access Point Software | =15.2 | |
Cisco Access Points |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6026 has a severity rating that indicates it can lead to a denial of service on affected Cisco Aironet Access Points.
To fix CVE-2012-6026, upgrade the Cisco Aironet Access Point software to a version later than 15.2.
CVE-2012-6026 affects Cisco Aironet Access Points running software versions 7.3, 7.4, 12.4, and 15.2.
CVE-2012-6026 allows remote attackers to launch a denial of service attack causing device reloads through crafted HTTP requests.
There is no documented workaround for CVE-2012-6026; the recommended mitigation is to update the software.