First published: Thu Mar 27 2014(Updated: )
The TCP Input module in Cisco IOS 12.2 through 12.4 and 15.0 through 15.4, when NAT is used, allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted TCP packets, aka Bug IDs CSCuh33843 and CSCuj41494.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2 | |
Cisco IOS | =12.3 | |
Cisco IOS | =12.4 | |
Cisco IOS | =15.0 | |
Cisco IOS | =15.1 | |
Cisco IOS | =15.2 | |
Cisco IOS | =15.3 | |
Cisco IOS | =15.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2109 has a high severity rating due to its potential to cause denial of service.
To fix CVE-2014-2109, upgrade to a patched version of Cisco IOS that addresses the vulnerability.
CVE-2014-2109 affects Cisco IOS versions 12.2 through 12.4 and 15.0 through 15.4.
CVE-2014-2109 involves denial of service attacks through crafted TCP packets.
Yes, CVE-2014-2109 can lead to memory consumption issues or device reloads.