#22486: CVE-2016-1409 = IPv6 ND DoS
-----------------------+------------------------
 Reporter:  anonymous  |      Owner:  developers
     Type:  defect     |     Status:  new
 Priority:  normal     |  Milestone:
Component:  packages   |    Version:  Trunk
 Keywords:             |
-----------------------+------------------------
 can anyone check if trunk or chaos_calmer are affected?

 CVE-2016-1409
 Published: 2016 May 25 16:00 GMT
 Cisco Advisory ID: cisco-sa-20160525-ipv6

 /cisco quote:

 A vulnerability in the IP Version 6 (IPv6) packet processing functions of
 multiple [Cisco] products could allow an unauthenticated, remote attacker
 to cause an affected device to stop processing IPv6 traffic, leading to a
 denial of service (DoS) condition on the device.

 The vulnerability is due to insufficient processing logic for crafted IPv6
 packets that are sent to an affected device. An attacker could exploit
 this vulnerability by sending crafted IPv6 Neighbor Discovery packets to
 an affected device for processing. A successful exploit could allow the
 attacker to cause the device to stop processing IPv6 traffic, leading to a
 DoS condition on the device.

 '''This vulnerability is not Cisco specific: any IPv6 processing unit not
 capable of dropping such packets early in the processing path or in
 hardware is affected by this vulnerability.'''

 Workarounds

 There are no workarounds that address this vulnerability.

 Customers should rely on external mitigation techniques, such as denying
 IPv6 ND packets in an access control list (ACL) placed on an Internet edge
 router, to protect infrastructure devices behind those routers. IPv6 ND
 packets should be limited to local links and dropping them on the edge can
 help protect the infrastructure. It is a commonly accepted best practice
 to drop these packets at the Internet edge. Alternatively, configuring
 static IPv6 neighbors where possible, and denying all IPv6 ND packets at
 the edge help mitigate this vulnerability.


 Fixed Software

 All releases of Cisco IOS XR Software, Cisco IOS Software, Cisco IOS XE
 Software, and Cisco NX-OS Software are affected by the vulnerability
 described in this advisory.

 Currently, there are no software updates that address this vulnerability.
 Updates for affected software releases will be published when they are
 available[...]

 /end cisco quote

--
Ticket URL: <https://dev.openwrt.org/ticket/22486>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
openwrt-tickets@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets

Reply via email to