First published: Wed Jun 19 2019(Updated: )
A vulnerability in the web server of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect bounds checking. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. An exploit could allow the attacker to cause a buffer overflow, resulting in a process crash and DoS condition on the device. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco SA 2019-0619 IMC DoS is high due to the potential for denial of service on affected devices.
To fix Cisco SA 2019-0619 IMC DoS, apply the available software updates provided by Cisco for the Integrated Management Controller.
Authenticated local users with access to Cisco Integrated Management Controller devices are affected by Cisco SA 2019-0619 IMC DoS.
An attacker can exploit Cisco SA 2019-0619 IMC DoS to perform a buffer overflow, causing a denial of service condition.
The cause of Cisco SA 2019-0619 IMC DoS is incorrect bounds checking in the web server of the Cisco Integrated Management Controller.