[apops] Cisco Security Advisory: Cisco IOS and IOS XE Software Smart Ins

  • To: apops at apops dot net
  • Subject: [apops] Cisco Security Advisory: Cisco IOS and IOS XE Software Smart Install Memory Leak Vulnerability
  • From: Cisco Systems Product Security Incident Response Team <psirt at cisco dot com>
  • Date: Wed, 28 Sep 2016 12:27:28 -0400
  • Cc: psirt at cisco dot com
  • Delivered-to: apops at mailman dot apnic dot net
  • Dkim-signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2566; q=dns/txt; s=iport; t=1475080077; x=1476289677; h=sender:from:to:cc:subject:date:message-id:reply-to: mime-version:content-transfer-encoding; bh=kIpeC++vYaHV1o2Q7TjqcmvGRdbzFcZW3/rT3xTnQB0=; b=MicOsunceCYOUwGO9nPB0Vi67P9V1XqT0xMoYS9uenF+Fs9OZC4Ps+gh BYZ44D8qDIlU/rxCBWbbdlFquQTa04F8VhU6WTGpNsSIj3vgOrkLyCv/d jKm2HUOr0Gg4fJpckDVk3Ezuh+pnph2ERTnwr4Y/h+xQ9UlrBACOp7r33 U=;
  • List-archive: <http://mailman.apnic.net/mailing-lists/apops/>
  • List-help: <mailto:apops-request@apops.net?subject=help>
  • List-id: Asia Pacific Operators Forum <apops.apops.net>
  • List-post: <mailto:apops@apops.net>
  • List-subscribe: <https://mailman.apnic.net/mailman/listinfo/apops>, <mailto:apops-request@apops.net?subject=subscribe>
  • List-unsubscribe: <https://mailman.apnic.net/mailman/options/apops>, <mailto:apops-request@apops.net?subject=unsubscribe>
  • Prevent-nondelivery-report:
  • Reply-to: psirt@cisco.com
  • Sender: nobody@cisco.com
    • Hash: SHA256
      
      Cisco Security Advisory: Cisco IOS and IOS XE Software Smart Install Memory Leak Vulnerability
      
      Advisory ID:  cisco-sa-20160928-smi
      
      Revision: 1.0
      
      For Public Release: 2016 September 28 16:00  GMT
      
      +------------------------------------------------------------------------------
      
      Summary
      =======
      
      The Smart Install client feature in Cisco IOS and IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a memory leak and eventual denial of service (DoS) condition on an affected device.
      
      The vulnerability is due to incorrect handling of image list parameters. An attacker could exploit this vulnerability by sending crafted Smart Install packets to TCP port 4786. A successful exploit could cause a Cisco Catalyst switch to leak memory and eventually reload, resulting in a DoS condition.
      
      Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability other than disabling Smart Install functionality on the affected device.
      
      This advisory is available at the following link:
      http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi
      
      This advisory is part of the September 28, 2016, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 11 vulnerabilities. All the vulnerabilities have a Security Impact Rating of High. For a complete list of the advisories and links to them, see Cisco Event Response: September 2016 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
      
      -----BEGIN PGP SIGNATURE-----
      Comment: GPGTools - http://gpgtools.org
      
      iQIcBAEBCAAGBQJX6vstAAoJEK89gD3EAJB5z5cP/jN0FAtH3nzkV5QMMWX42dEB
      2kA0Bb2OkL6FUW6zp2mRsGKM8UwpKAOgctHYp0SLpIxQC3SJWCaavIqlYQ3noket
      4NEaB+P5wAABkq4m0pxa+NorF6x5VbA2yU4LB7kgofg6Izxso7QtjogPUy5r44Cp
      oDV1CGC+oTjfizg2pF0Bj3vxfwv5hz2ZCUWq01fs8OF6N4lVs18deskLtLvEOPo7
      1IwyIwJEUuxvR2XjRWbTgTt2HKmdgGSpbw9TVaYcBoMCFr/k1uhvgA3b8KyH2az/
      y4Ao6EmgvI2SalJlTpmTPAeNDjSmSbnatq2nA8IOFjSn70OBtMcSPUfbzSZ5wLlw
      HnFAkYuBNkzkMsj4+gu5jayQcUVvcxdL5Zco0hGaAYgjUihh0PHfYGBsEkInvdE/
      5X4axai/MH/zLDrO7YHwvIPVXjmDra+evSxhl7FTxhIFR22GdJ9VsZE2JdvNuXU/
      ddiqF7htiTMzT2GF+zLAL8aQdjnw3Ft/F65U1VR8/Rdxsc5kn8fyKLxmjPiPuyYK
      VcoGq2sC5foOBdKXi6k7oaOoYTgiSyTxah5s70GZwirLGfL+6vDVMdaSqljX4ot4
      IuhX9fAi0gaMXpGEFEf7SAF4y91Skr2DQWxMWhNkdJ6WFPVXU2aE+G3Y3urjPR/O
      cqKVSps53RqSlRhixPBF
      =DfQ0
      -----END PGP SIGNATURE-----