Cisco Internetwork Operating System (IOS) IPv6 packet handling is vulnerable to a denial-of-service attack and may potentially be vulnerable to a flaw that allows arbitrary code execution.
Cisco Systems devices running IOS that are configured to handle Internet Protocol version 6 (IPv6) traffic may not properly handle a specially-crafted packet sent from the local network segment. This improper packet handling may result in a denial-of-service condition or in the execution of arbitrary code on the device running IOS. The specific nature of the crafted packets exploiting this vulnerability is not known.
Only devices configured to handle IPv6 traffic are vulnerable to this flaw. Any logical or physical interface that handles the crafted packet is vulnerable to the flaw. In addition, the attacker must send the crafted packet on the local network segment. Packets sent one or more hops away from the device will not affect the vulnerable device in a negative manner.
A remote, unauthenticated attacker on the local network segment that can craft and send an arbitrary IPv6 packet may be able to crash or take control of the device running IOS.
Apply An Update
Information regarding this vulnerability was primarily provided by Cisco Systems, who in turn acknowledge the disclosure of this vulnerability at Black Hat USA 2005.
This document was written by Ken MacInnis.
|Date First Published:||2005-08-01|
|Date Last Updated:||2005-08-02 23:12 UTC|