First published: Fri Sep 27 2013(Updated: )
The DNS-over-TCP implementation in Cisco IOS 12.2 and 15.0 through 15.3, when NAT is used, allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 DNS TCP stream, aka Bug ID CSCtn53730.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2 | |
Cisco IOS | =15.0 | |
Cisco IOS | =15.1 | |
Cisco IOS | =15.2 | |
Cisco IOS | =15.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5479 has a high severity rating as it can lead to a denial of service condition.
To mitigate CVE-2013-5479, upgrade to a fixed version of Cisco IOS or disable NAT if possible.
CVE-2013-5479 affects Cisco IOS versions 12.2, 15.0, 15.1, 15.2, and 15.3.
Yes, CVE-2013-5479 can be exploited remotely via a specially crafted IPv4 DNS TCP stream.
Exploitation of CVE-2013-5479 can cause the affected Cisco devices to reload, resulting in service interruptions.