First published: Mon Oct 31 2016(Updated: )
A memory corruption in the IPsec code path of Brocade NetIron OS on Brocade MLXs 5.8.00 through 5.8.00e, 5.9.00 through 5.9.00bd, 6.0.00, and 6.0.00a images could allow attackers to cause a denial of service (line card reset) via certain constructed IPsec control packets.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Brocade NetIron OS | <=5.8.00e | |
Brocade NetIron OS | <=5.9.00bd | |
Brocade NetIron OS | =6.0.00 | |
Brocade NetIron OS | =6.0.00a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-8203 is classified as high due to its potential to cause a denial of service.
To fix CVE-2016-8203, update the Brocade NetIron OS to a version that addresses this vulnerability.
CVE-2016-8203 affects Brocade NetIron OS versions 5.8.00 through 5.8.00e, 5.9.00 through 5.9.00bd, and versions 6.0.00 and 6.0.00a.
CVE-2016-8203 can be exploited through crafted IPsec control packets causing a reset of the line card.
Yes, CVE-2016-8203 is specific to Brocade MLX series devices running affected versions of NetIron OS.