First published: Wed Jan 08 2014(Updated: )
The BGP implementation in Cisco NX-OS 6.2(2a) and earlier does not properly handle the interaction of UPDATE messages with IPv6, VPNv4, and VPNv6 labeled unicast-address families, which allows remote attackers to cause a denial of service (peer reset) via a crafted message, aka Bug ID CSCuj03174.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | <=6.2\(2a\) | |
Cisco Nx-os | ||
Cisco Nx-os | =4.0 | |
Cisco Nx-os | =4.0\(0\)n1\(1a\) | |
Cisco Nx-os | =4.0\(0\)n1\(2\) | |
Cisco Nx-os | =4.0\(0\)n1\(2a\) | |
Cisco Nx-os | =4.0\(1a\)n1\(1\) | |
Cisco Nx-os | =4.0\(1a\)n1\(1a\) | |
Cisco Nx-os | =4.0\(1a\)n2\(1\) | |
Cisco Nx-os | =4.0\(1a\)n2\(1a\) | |
Cisco Nx-os | =4.0\(4\)sv1\(1\) | |
Cisco Nx-os | =4.0\(4\)sv1\(2\) | |
Cisco Nx-os | =4.0\(4\)sv1\(3\) | |
Cisco Nx-os | =4.0\(4\)sv1\(3a\) | |
Cisco Nx-os | =4.0\(4\)sv1\(3b\) | |
Cisco Nx-os | =4.0\(4\)sv1\(3c\) | |
Cisco Nx-os | =4.0\(4\)sv1\(3d\) | |
Cisco Nx-os | =4.1\(3\)n1\(1\) | |
Cisco Nx-os | =4.1\(3\)n1\(1a\) | |
Cisco Nx-os | =4.1\(3\)n2\(1\) | |
Cisco Nx-os | =4.1\(3\)n2\(1a\) | |
Cisco Nx-os | =4.1.\(2\) | |
Cisco Nx-os | =4.1.\(3\) | |
Cisco Nx-os | =4.1.\(4\) | |
Cisco Nx-os | =4.1.\(5\) | |
Cisco Nx-os | =4.2 | |
Cisco Nx-os | =4.2\(1\) | |
Cisco Nx-os | =4.2\(1\)n1\(1\) | |
Cisco Nx-os | =4.2\(1\)n2\(1\) | |
Cisco Nx-os | =4.2\(1\)n2\(1a\) | |
Cisco Nx-os | =4.2\(1\)sv1\(4\) | |
Cisco Nx-os | =4.2\(1\)sv1\(4a\) | |
Cisco Nx-os | =4.2\(1\)sv1\(5.1\) | |
Cisco Nx-os | =4.2\(2\) | |
Cisco Nx-os | =4.2\(3\) | |
Cisco Nx-os | =4.2\(4\) | |
Cisco Nx-os | =4.2\(6\) | |
Cisco Nx-os | =4.2\(8\) | |
Cisco Nx-os | =4.2.\(2a\) | |
Cisco Nx-os | =5.0 | |
Cisco Nx-os | =5.0\(2\) | |
Cisco Nx-os | =5.0\(2\)n1\(1\) | |
Cisco Nx-os | =5.0\(2\)n2\(1\) | |
Cisco Nx-os | =5.0\(2\)n2\(1a\) | |
Cisco Nx-os | =5.0\(2a\) | |
Cisco Nx-os | =5.0\(3\) | |
Cisco Nx-os | =5.0\(3\)n1\(1\) | |
Cisco Nx-os | =5.0\(3\)n1\(1a\) | |
Cisco Nx-os | =5.0\(3\)n1\(1b\) | |
Cisco Nx-os | =5.0\(3\)n1\(1c\) | |
Cisco Nx-os | =5.0\(3\)n2\(1\) | |
Cisco Nx-os | =5.0\(3\)n2\(2\) | |
Cisco Nx-os | =5.0\(3\)n2\(2a\) | |
Cisco Nx-os | =5.0\(3\)n2\(2b\) | |
Cisco Nx-os | =5.0\(3\)u1\(1a\) | |
Cisco Nx-os | =5.0\(3\)u1\(1b\) | |
Cisco Nx-os | =5.0\(3\)u1\(1d\) | |
Cisco Nx-os | =5.0\(3\)u1\(2\) | |
Cisco Nx-os | =5.0\(3\)u1\(2a\) | |
Cisco Nx-os | =5.0\(3\)u2\(1\) | |
Cisco Nx-os | =5.0\(3\)u2\(2\) | |
Cisco Nx-os | =5.0\(3\)u2\(2a\) | |
Cisco Nx-os | =5.0\(3\)u2\(2b\) | |
Cisco Nx-os | =5.0\(3\)u2\(2c\) | |
Cisco Nx-os | =5.0\(3\)u2\(2d\) | |
Cisco Nx-os | =5.0\(3\)u3\(1\) | |
Cisco Nx-os | =5.0\(3\)u3\(2\) | |
Cisco Nx-os | =5.0\(3\)u3\(2a\) | |
Cisco Nx-os | =5.0\(3\)u3\(2b\) | |
Cisco Nx-os | =5.0\(3\)u4\(1\) | |
Cisco Nx-os | =5.0\(3\)u5\(1\) | |
Cisco Nx-os | =5.0\(3\)u5\(1a\) | |
Cisco Nx-os | =5.0\(3\)u5\(1b\) | |
Cisco Nx-os | =5.0\(3\)u5\(1c\) | |
Cisco Nx-os | =5.0\(3\)u5\(1d\) | |
Cisco Nx-os | =5.0\(3\)u5\(1e\) | |
Cisco Nx-os | =5.0\(5\) | |
Cisco Nx-os | =5.1 | |
Cisco Nx-os | =5.1\(1\) | |
Cisco Nx-os | =5.1\(1a\) | |
Cisco Nx-os | =5.1\(2\) | |
Cisco Nx-os | =5.1\(3\) | |
Cisco Nx-os | =5.1\(3\)n1\(1\) | |
Cisco Nx-os | =5.1\(3\)n1\(1a\) | |
Cisco Nx-os | =5.1\(4\) | |
Cisco Nx-os | =5.1\(5\) | |
Cisco Nx-os | =5.1\(6\) | |
Cisco Nx-os | =5.2 | |
Cisco Nx-os | =5.2\(1\) | |
Cisco Nx-os | =5.2\(3\) | |
Cisco Nx-os | =5.2\(3a\) | |
Cisco Nx-os | =5.2\(4\) | |
Cisco Nx-os | =5.2\(5\) | |
Cisco Nx-os | =5.2\(7\) | |
Cisco Nx-os | =5.2\(9\) | |
Cisco Nx-os | =6.0\(1\) | |
Cisco Nx-os | =6.0\(2\) | |
Cisco Nx-os | =6.1 | |
Cisco Nx-os | =6.1\(1\) | |
Cisco Nx-os | =6.1\(2\) | |
Cisco Nx-os | =6.1\(3\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.