-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2013-0088 Title: Cisco IOS XE: Denial of service - Remote/unauthenticated [1] Version history: 04.11.2013 Initial publication Summary ======= Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) contains the following denial of service (DoS) vulnerabilities: Cisco IOS XE Software Malformed ICMP Packet Denial of Service Vulnerability Cisco IOS XE Software PPTP Traffic Denial of Service Vulnerability Cisco IOS XE Software TCP Segment Reassembly Denial of Service Vulnerability Cisco IOS XE Software Malformed EoGRE Packet Denial of Service Vulnerability CVE numbers: CVE-2013-5543 CVE-2013-5545 CVE-2013-5546 CVE-2013-5547 [1] Vulnerable systems ================== Cisco IOS XE Original Details ================ These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others. Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the embedded services processors (ESP) card or the route processor (RP) card, causing an interruption of services. Repeated exploitation could result in a sustained DoS condition. What can you do? ================ There is a patch. [1] What to tell your users? ======================== N/A More information ================ [1] http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131030-asr1000 Best regards, CERT-EU (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJSd9e3AAoJEPpzpNLI8SVoK9YP/2fexRxiMk8xRFQkhCJL71Ub jOv1dpnjPYPrJ4l742PbyDmsUiKzs7LdHtKQG9KFYb8t7Oq6Kgfs5BUaFS6a0FMC zIIAd2CgB5fZo0FZMWZEiipI1n+zTa2GFEnPUi8mw/XmOqDDLxxEVGFQ6tvPyRHX wzzffAvaLvxbA55lkqyR+8mBjVOUWGgktc7vg1kZN6Go7USgLRWRt2WPswdERyih r1HMG64c+sc3rLDdGGs8yQnvzQnyiAeQMm8UVXH34SdB21Kf4dbJodQAQG9PWzWO EQfiRBKmausTRkTuio9liu5qmtgLO1/TldTaEkfLFNTy1rxk1q2jG6bWvLjWIHIz ooB35GwQeaJ5De86uixSV7XG6L+vRIV8BsFSHivsgTjL31sFi88+1rPNfQNfhqS6 QMKXvE4Mc24gs/srY3F3Ve99HLO9xemcrfb4NV+kV7IYTgXeXoEkvcRmQ6eQht3V Fap8Z7x/1WYr8/f4eggpCfv+GtqrfPHfFDcrGu6+cDyvQ7FyC7s34KBuTHMkI0st P3fRqE0jkHaQ173KJvnakGy3E1sthrIen6ODStwT163wFnFPlqeq5ih898BiAXX5 O4qYMFxHzXoIjYnxs6e8Dh4KwL1DKEswzomoUfeTGNVeY6OO3eC8bWxuP24Xpwir gzlPloOFU1YsYp77GyRw =hNbn -----END PGP SIGNATURE-----