First published: Thu Jan 23 2014(Updated: )
The OSPF implementation on Enterasys switches and routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enterasys C5 | ||
Enterasys G3 | ||
Enterasys K10 | ||
Enterasys K6 | ||
Enterasys S130 | ||
Enterasys S140 | ||
Enterasys S150 | ||
Enterasys S155 | ||
Enterasys S180 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7312 is considered a high severity vulnerability as it can lead to denial of service due to routing disruptions.
To fix CVE-2013-7312, update your Enterasys switches and routers to the latest firmware that addresses this vulnerability.
CVE-2013-7312 affects several Enterasys devices including models C5, G3, K10, K6, S130, S140, S150, S155, and S180.
CVE-2013-7312 could allow remote attackers to execute a denial of service attack by exploiting OSPF Link State advertisements.
Mitigation of CVE-2013-7312 involves applying vendor patches and staying updated on device configurations to prevent exploitation.