First published: Tue Dec 15 2015(Updated: )
The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS 15.3(3)S0.1 on ASR devices mishandles internal tables, which allows remote attackers to cause a denial of service (memory consumption or device crash) via a flood of crafted ND messages, aka Bug ID CSCup28217.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.2\(4\)e | |
Cisco IOS | =15.2\(4\)pi | |
Cisco IOS | =15.2\(4\)st | |
Cisco IOS | =15.2\(5\)st | |
Cisco IOS | =15.3\(3\)s0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6359 has been classified as a high-severity vulnerability due to its potential to cause denial of service.
To fix CVE-2015-6359, upgrade affected Cisco IOS software to a version that addresses the vulnerability.
Exploitation of CVE-2015-6359 can lead to excessive memory consumption or a complete device crash.
CVE-2015-6359 affects Cisco IOS versions 15.2(4)e, 15.2(4)pi, 15.2(4)st, 15.2(5)st, and 15.3(3)s0.1.
CVE-2015-6359 allows remote attackers to perform a denial of service attack by flooding devices with crafted Neighbor Discovery messages.