Vulnslist

find the latest Cisco vulnerabilities

Cisco ASR 5500 Series with DPC2 Cards SESSMGR Denial of Service Vulnerability

cisco-sa-20161102-asr · Medium · Published · Updated

A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. The vulnerability is due to improper processing during the handoff of reassembled IPv4 or IPv6 packets. An attacker could exploit this vulnerability by sending crafted IPv4 or IPv6 fragments across the ASR 5500 Series router. An exploit could allow the attacker to cause an instance of the sessmgr service on the affected device to reload. A reload of the sessmgr service will cause all subscriber sessions serviced by that task to be disconnected, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There is a workaround that addresses this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr

Workarounds

To work around and help prevent the effects of an attempt to exploit this vulnerability, administrators can change the maximum transmission unit (MTU) configuration on one or more internal interfaces for an affected device. Note that this workaround will not persist if a card is rebooted. If a card is rebooted, the MTU configuration must be changed again. For information about implementing this workaround, please contact the Cisco Technical Assistance Center (TAC).

CVEsCVE-2016-6455
Cisco Bug IDsCSCvb12081
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
Product Names From Source
Cisco ASR 5000 Series Software

Related Products

Product CVE Evidence
Cisco ASR 5000 Series Software CVE-2016-6455 Cisco OpenVuln