Vulnslist

find the latest Cisco vulnerabilities

Cisco Videoscape Distribution Suite for Internet Streaming TCP Session Handling Denial of Service Vulnerability

cisco-sa-20160226-vds-is · Medium · Published · Updated

A vulnerability in TCP connection handling when TCP sessions are terminated via a TCP FIN packet for the Cisco Videoscape Distribution Suite for Internet Streaming (VDS-IS) could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition. The vulnerability is due to improper TCP session management when a TCP session is in TCP FIN waiting state. The device could fail to respond properly to a new TCP SYN packet to start a new TCP connection. An attacker could exploit this vulnerability by sending TCP traffic streams that could terminate the connection with a TCP FIN. An exploit could allow the attacker to cause a partial DoS condition. When a TCP session is in a TCP FIN waiting state, it is possible that new incoming TCP SYN packets will be dropped silently. Cisco has not released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160226-vds-is

Workarounds

To work around this vulnerability, administrators may disable the TCP timeout option, which is enabled by default.

CVEsCVE-2016-1353
Cisco Bug IDsCSCuy45136
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:C
Product Names From Source
Cisco Videoscape Distribution Suite for Internet Streaming (VDS-IS)

Related Products

Product CVE Evidence
Cisco Videoscape Distribution Suite for Internet Streaming (VDS-IS) CVE-2016-1353 Cisco OpenVuln