First published: Sat Aug 29 2020(Updated: )
Multiple vulnerabilities in the Distance Vector Multicast Routing Protocol (DVMRP) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to either immediately crash the Internet Group Management Protocol (IGMP) process or make it consume available memory and eventually crash. The memory consumption may negatively impact other processes that are running on the device. These vulnerabilities are due to the incorrect handling of IGMP packets. An attacker could exploit these vulnerabilities by sending crafted IGMP traffic to an affected device. A successful exploit could allow the attacker to immediately crash the IGMP process or cause memory exhaustion, resulting in other processes becoming unstable. These processes may include, but are not limited to, interior and exterior routing protocols. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. There are multiple mitigations available to customers depending on their needs. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz
Credit: These vulnerabilities were found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR Software | ||
Cisco IOS XR Software | =6.6.3<asr9k-px-6.6.3.CSCvv54838.pie=6.6.2<asr9k-px-6.6.2.CSCvv60110.pie=6.5.3<asr9k-px-6.5.3.CSCvv60110.pie=6.4.2<asr9k-px-6.4.2.CSCvv60110.pie=6.3.3<asr9k-px-6.3.3.CSCvv60110.pie=6.2.3<asr9k-px-6.2.3.CSCvv60110.pie=6.1.4<asr9k-px-6.1.4.CSCvv60110.pie | asr9k-px-6.6.3.CSCvv54838.pie asr9k-px-6.6.2.CSCvv60110.pie asr9k-px-6.5.3.CSCvv60110.pie asr9k-px-6.4.2.CSCvv60110.pie asr9k-px-6.3.3.CSCvv60110.pie asr9k-px-6.2.3.CSCvv60110.pie asr9k-px-6.1.4.CSCvv60110.pie |
Cisco IOS XR Software | =7.1.2<asr9k-x64-7.1.2.CSCvv54838=7.1.15<asr9k-x64-7.1.15.CSCvv54838=7.0.2<asr9k-x64-7.0.2.CSCvv54838=6.6.3<asr9k-x64-6.6.3.CSCvv54838=6.6.2<asr9k-x64-6.6.2.CSCvv60110=6.4.2<asr9k-x64-6.4.2.CSCvv60110=6.2.3<asr9k-x64-6.2.3.CSCvv60110=6.1.4<asr9k-x64-6.1.4.CSCvv60110 | asr9k-x64-7.1.2.CSCvv54838 asr9k-x64-7.1.15.CSCvv54838 asr9k-x64-7.0.2.CSCvv54838 asr9k-x64-6.6.3.CSCvv54838 asr9k-x64-6.6.2.CSCvv60110 asr9k-x64-6.4.2.CSCvv60110 asr9k-x64-6.2.3.CSCvv60110 asr9k-x64-6.1.4.CSCvv60110 |
Cisco IOS XR Software | =6.4.3<hfr-px-6.4.3.CSCvv60110.pie=6.4.2<hfr-px-6.4.2.CSCvv60110.pie=6.1.4<hfr-px-6.1.4.CSCvv60110.pie | hfr-px-6.4.3.CSCvv60110.pie hfr-px-6.4.2.CSCvv60110.pie hfr-px-6.1.4.CSCvv60110.pie |
Cisco IOS XR Software | =6.5.2<ncs5500-6.5.2.CSCvv60110 | ncs5500-6.5.2.CSCvv60110 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for these Cisco IOS XR Software DVMRP Memory Exhaustion vulnerabilities is cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz.
The severity of the Cisco IOS XR Software DVMRP Memory Exhaustion vulnerabilities is high with a CVSS score of 8.6.
The Cisco IOS XR Software versions listed in the advisory are affected by these vulnerabilities.
An unauthenticated, remote attacker could either immediately crash the IGMP process or make it consume available memory and eventually crash it.
You can find more information about these vulnerabilities on the Cisco Security Advisory page provided in the reference section of the advisory.