[c-nsp] Cisco Security Advisory: Cisco IOS XR Software Memory Exhaustion Vulnerability

Cisco Systems Product Security Incident Response Team psirt at cisco.com
Wed Oct 2 12:00:10 EDT 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Cisco Security Advisory: Cisco IOS XR Software Memory Exhaustion Vulnerability

Advisory ID: cisco-sa-20131002-iosxr

Revision 1.0

For Public Release 2013 October 2 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

Cisco IOS XR Software version 4.3.1 contains a vulnerability that could result in complete packet memory exhaustion.  Successful exploitation could render critical services on the affected device unable to allocate packets resulting in a denial of service (DoS) condition.

Cisco has released free software updates that address this vulnerability.

Workarounds that mitigate this vulnerability are available.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131002-iosxr

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.20 (Darwin)

iF4EAREKAAYFAlJMIq8ACgkQUddfH3/BbTqjjwD/eOsOi/QIx1MC6+ZORbUAXc3K
fcOK4tErQCNfv3jWDk4A/38adqa7pARVMfwKu0l2dDXEPQp6zS4qERwS8TBNdlQc
=YZja
-----END PGP SIGNATURE-----


More information about the cisco-nsp mailing list