Lucene search

K
ciscoCiscoCISCO-SA-20160928-SMI
HistorySep 28, 2016 - 4:00 p.m.

Cisco IOS and IOS XE Software Smart Install Memory Leak Vulnerability

2016-09-2816:00:00
tools.cisco.com
11

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.2%

The Smart Install client feature in Cisco IOS and IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a memory leak and eventual denial of service (DoS) condition on an affected device.

The vulnerability is due to incorrect handling of image list parameters. An attacker could exploit this vulnerability by sending crafted Smart Install packets to TCP port 4786. A successful exploit could cause a Cisco Catalyst switch to leak memory and eventually reload, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability other than disabling Smart Install functionality on the affected device.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-smi”]

This advisory is part of the September 28, 2016, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 10 Cisco Security Advisories that describe 11 vulnerabilities. All the vulnerabilities have a Security Impact Rating of “High.” For a complete list of the advisories and links to them, see Cisco Event Response: September 2016 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-56513”].

Affected configurations

Vulners
Node
ciscoiosMatch12.2se
OR
ciscoiosMatch12.2ex
OR
ciscoiosMatch12.2ey
OR
ciscoiosMatch12.2ez
OR
ciscoiosMatch15.0ey
OR
ciscoiosMatch15.0se
OR
ciscoiosMatch15.1sg
OR
ciscoiosMatch15.0ex
OR
ciscoiosMatch15.0ea
OR
ciscoiosMatch15.2e
OR
ciscoiosMatch15.0ez
OR
ciscoiosMatch15.2ey
OR
ciscoiosMatch15.0ej
OR
ciscoiosMatch15.2eb
OR
ciscoiosMatch15.2ea
OR
ciscorvs4000_softwareMatch3.2se
OR
ciscorvs4000_softwareMatch3.3se
OR
ciscorvs4000_softwareMatch3.3xo
OR
ciscorvs4000_softwareMatch3.5e
OR
ciscorvs4000_softwareMatch3.6e
OR
ciscorvs4000_softwareMatch3.7e
OR
ciscorvs4000_softwareMatch3.8e
OR
ciscoiosMatch12.2\(55\)se
OR
ciscoiosMatch12.2\(55\)se3
OR
ciscoiosMatch12.2\(55\)se2
OR
ciscoiosMatch12.2\(58\)se
OR
ciscoiosMatch12.2\(55\)se1
OR
ciscoiosMatch12.2\(58\)se1
OR
ciscoiosMatch12.2\(55\)se4
OR
ciscoiosMatch12.2\(58\)se2
OR
ciscoiosMatch12.2\(55\)se5
OR
ciscoiosMatch12.2\(55\)se6
OR
ciscoiosMatch12.2\(55\)se7
OR
ciscoiosMatch12.2\(55\)se8
OR
ciscoiosMatch12.2\(55\)se9
OR
ciscoiosMatch12.2\(55\)se10
OR
ciscoiosMatch12.2\(55\)ex
OR
ciscoiosMatch12.2\(55\)ex1
OR
ciscoiosMatch12.2\(55\)ex2
OR
ciscoiosMatch12.2\(55\)ex3
OR
ciscoiosMatch12.2\(55\)ey
OR
ciscoiosMatch12.2\(55\)ez
OR
ciscoiosMatch15.0\(1\)ey
OR
ciscoiosMatch15.0\(1\)ey2
OR
ciscoiosMatch15.0\(1\)se
OR
ciscoiosMatch15.0\(2\)se
OR
ciscoiosMatch15.0\(1\)se1
OR
ciscoiosMatch15.0\(1\)se2
OR
ciscoiosMatch15.0\(1\)se3
OR
ciscoiosMatch15.0\(2\)se1
OR
ciscoiosMatch15.0\(2\)se2
OR
ciscoiosMatch15.0\(2\)se3
OR
ciscoiosMatch15.0\(2\)se4
OR
ciscoiosMatch15.0\(2\)se5
OR
ciscoiosMatch15.0\(2\)se6
OR
ciscoiosMatch15.0\(2\)se7
OR
ciscoiosMatch15.0\(2\)se8
OR
ciscoiosMatch15.0\(2\)se9
OR
ciscoiosMatch15.0\(2a\)se9
OR
ciscoiosMatch15.1\(2\)sg
OR
ciscoiosMatch15.1\(2\)sg1
OR
ciscoiosMatch15.1\(2\)sg2
OR
ciscoiosMatch15.1\(2\)sg3
OR
ciscoiosMatch15.1\(2\)sg4
OR
ciscoiosMatch15.1\(2\)sg5
OR
ciscoiosMatch15.1\(2\)sg6
OR
ciscoiosMatch15.1\(2\)sg7
OR
ciscoiosMatch15.0\(2\)ex
OR
ciscoiosMatch15.0\(2\)ex1
OR
ciscoiosMatch15.0\(2\)ex2
OR
ciscoiosMatch15.0\(2\)ex3
OR
ciscoiosMatch15.0\(2\)ex4
OR
ciscoiosMatch15.0\(2\)ex5
OR
ciscoiosMatch15.0\(2\)ex6
OR
ciscoiosMatch15.0\(2\)ex7
OR
ciscoiosMatch15.0\(2\)ex8
OR
ciscoiosMatch15.0\(2a\)ex5
OR
ciscoiosMatch15.0\(2\)ex10
OR
ciscoiosMatch15.0\(2\)ex11
OR
ciscoiosMatch15.0\(2\)ea1
OR
ciscoiosMatch15.2\(1\)e
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(1\)e1
OR
ciscoiosMatch15.2\(3\)e
OR
ciscoiosMatch15.2\(1\)e2
OR
ciscoiosMatch15.2\(1\)e3
OR
ciscoiosMatch15.2\(2\)e1
OR
ciscoiosMatch15.2\(2b\)e
OR
ciscoiosMatch15.2\(4\)e
OR
ciscoiosMatch15.2\(3\)e1
OR
ciscoiosMatch15.2\(2\)e2
OR
ciscoiosMatch15.2\(2a\)e1
OR
ciscoiosMatch15.2\(2\)e3
OR
ciscoiosMatch15.2\(2a\)e2
OR
ciscoiosMatch15.2\(3\)e2
OR
ciscoiosMatch15.2\(3a\)e
OR
ciscoiosMatch15.2\(3\)e3
OR
ciscoiosMatch15.2\(3m\)e2
OR
ciscoiosMatch15.2\(4\)e1
OR
ciscoiosMatch15.2\(2\)e4
OR
ciscoiosMatch15.2\(4m\)e1
OR
ciscoiosMatch15.0\(2\)ez
OR
ciscoiosMatch15.2\(1\)ey
OR
ciscoiosMatch15.0\(2\)ej
OR
ciscoiosMatch15.0\(2\)ej1
OR
ciscoiosMatch15.2\(2\)eb
OR
ciscoiosMatch15.2\(2\)eb1
OR
ciscoiosMatch15.2\(2\)eb2
OR
ciscoiosMatch15.2\(2\)ea
OR
ciscoiosMatch15.2\(2\)ea1
OR
ciscoiosMatch15.2\(2\)ea2
OR
ciscoiosMatch15.2\(3\)ea
OR
ciscoiosMatch15.2\(4\)ea
OR
ciscoiosMatch15.2\(4\)ea1
OR
ciscoiosMatch15.2\(2\)ea3
OR
ciscoiosMatch15.2\(4\)ea3
OR
ciscoiosMatch15.2\(4\)ea2
OR
ciscorvs4000_softwareMatch3.2.0se
OR
ciscorvs4000_softwareMatch3.2.1se
OR
ciscorvs4000_softwareMatch3.2.2se
OR
ciscorvs4000_softwareMatch3.2.3se
OR
ciscorvs4000_softwareMatch3.3.0se
OR
ciscorvs4000_softwareMatch3.3.1se
OR
ciscorvs4000_softwareMatch3.3.2se
OR
ciscorvs4000_softwareMatch3.3.3se
OR
ciscorvs4000_softwareMatch3.3.4se
OR
ciscorvs4000_softwareMatch3.3.5se
OR
ciscorvs4000_softwareMatch3.3.0xo
OR
ciscorvs4000_softwareMatch3.3.1xo
OR
ciscorvs4000_softwareMatch3.3.2xo
OR
ciscorvs4000_softwareMatch3.5.0e
OR
ciscorvs4000_softwareMatch3.5.1e
OR
ciscorvs4000_softwareMatch3.5.2e
OR
ciscorvs4000_softwareMatch3.5.3e
OR
ciscorvs4000_softwareMatch3.6.0e
OR
ciscorvs4000_softwareMatch3.6.1e
OR
ciscorvs4000_softwareMatch3.6.0ae
OR
ciscorvs4000_softwareMatch3.6.0be
OR
ciscorvs4000_softwareMatch3.6.2ae
OR
ciscorvs4000_softwareMatch3.6.3e
OR
ciscorvs4000_softwareMatch3.6.4e
OR
ciscorvs4000_softwareMatch3.7.0e
OR
ciscorvs4000_softwareMatch3.7.1e
OR
ciscorvs4000_softwareMatch3.7.2e
OR
ciscorvs4000_softwareMatch3.7.3e
OR
ciscorvs4000_softwareMatch3.8.0e
OR
ciscorvs4000_softwareMatch3.8.1e
OR
ciscorvs4000_softwareMatch3.8.2e
Rows per page:
1-10 of 1481

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.2%

Related for CISCO-SA-20160928-SMI