Vulnerability Note VU#217912
Cisco IOS fails to properly process TCP packets
The Cisco IOS Transmission Control Protocol listener contains a memory leak.
Cisco IOS is an operating system that is used on Cisco network devices. The Cisco IOS software can run Transmission Control Protocol (TCP) servers that allow administrators to connect to the devices for management or monitoring purposes.
A vulnerability exists in the IOS TCP listener. An attacker may be able to craft an IPv4 TCP packet that causes IOS to leak memory when processed. An attacker may be able to exploit this vulnerability to create a denial-of-service condition. The specially crafted TCP can be delivered outside the context of a fully established TCP 3-way handshake.
A remote, unauthenticated attacker with the ability to supply specially crafted TCP packets could cause memory to leak in the affected service. Sustained exploitation could eventually cause a denial of service due to shortage of memory in the affected device and would require a system reset to recover. An attacker could send spoofed TCP packets to trigger this vulnerability making an attack harder to detect or stop.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Cisco Systems, Inc.||Affected||-||24 Jan 2007|
CVSS Metrics (Learn More)
Thanks to Cisco for information that was used in this report.
This document was written by Ryan Giobbi.
- CVE IDs: Unknown
- Date Public: 24 Jan 2007
- Date First Published: 24 Jan 2007
- Date Last Updated: 02 Feb 2007
- Severity Metric: 7.53
- Document Revision: 39
If you have feedback, comments, or additional information about this vulnerability, please send us email.