-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2012-0105 Title: Cisco IOS XR Software Route Processor DoS Vulnerability [1] Version history: 17.08.2012 Initial publication Summary ======= Cisco IOS XR Software is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause the route processor on an affected device to stop transmitting packets from the route processor CPU to the fabric, resulting in a denial-of-service condition. To exploit this issue, attackers can use readily available network utilities. [2] CVSS Base Score CVSS v2 Base Score:7.8 (HIGH) (AV:N/AC:L/Au:N/C:N/I:N/A:C) [3,4] Affected Versions ================= Cisco IOS XR Software 4.0 .1, .3, .4 | 4.1 .0, .1, .2 | 4.2 .0 Original Details ================ Cisco IOS XR Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted device. The vulnerability is due to improper processing of malformed packets by the affected devices. An unauthenticated, remote attacker could exploit this vulnerability by sending malicious packets to the device. If successful, the attacker could cause the device to stop transmitting packets to the fabric, resulting in a DoS condition. Cisco has confirmed this vulnerability and has released updated software. [1] What can you do? ================ The vendor has released updates. [2] What to tell your users? ======================== N/A More information ================ [1] http://www.securityfocus.com/bid/54825 [2] http://tools.cisco.com/security/center/viewAlert.x?alertId=26613 [3] Information about CVSS: http://www.first.org/cvss/cvss-guide.html [4] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2488 Best regards, CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 Privacy Statement: http://cert.europa.eu/cert/plainedition/en/cert_privacy.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJQLlAOAAoJEPpzpNLI8SVoBKcP/il2DkDYB1hyzmUFSg0w42Jy fJzv472xQACW98YFF5a1i2YOV6WdBmujFBicsH2VgkaQ3BaAOH98nCmhltjKgLla 4n+2tWHsEdZd8TgA4nBRLNUOt1CG333ZmWrEKuvRgQSr79Y9MnwvT2L+3ERmkRrf cBpBTkQ997hLoQwbwMSDu0yXn7GQT59VMfwlGXSfB2+AMVVhVVFGsu1IKjy96F0/ CBC1jBe8eTCDCWtN2lkcrbiQBMi4Hhjujpugvrp1r7JhO55OVchUXG9VOpmdiG+7 jpJw4StrgEZoTmZaKVkannSKLhcHHl9o2/2we6Uh90xxjcSqULwT5I4IPvkcwLl+ XKpW7NS10E65A20PGnvRXhf6+MpYwES5eFsLy2y9lxDoryOgQEl6hxbhOQjYPDfN CJr6AkbR1f9iLZK+pTeEKCK1Fd2nNkHK+9rU4K3hlwP7oXK5wTBVsfehoxvMqAXG JGIDkgbz0aWnMxA8F6KEp4E/JePIyG8USPQ7H6umB0M5JyfuvKPp6cIP9J8RbXgW DTdmZWNfiCWj1keUkFfewHKCrmRJUV0Tgk3BwlYV7hIKkl2qoxQrnSNsW+QLpx7i tjTcigvywRKc2WYrU5eEz/Or8rrLxRZw2w2sThcOSjSWEFp+mbAhZRAkPRyiLrwL opakrgNJJKhOyj+0uOO6 =S5ys -----END PGP SIGNATURE-----