The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Cisco IOS, IOS XE: denial of service via H.323

Synthesis of the vulnerability

An attacker can send a malicious H.323 packet to Cisco IOS or IOS XE, in order to trigger a denial of service.
Severity of this alert: 3/4.
Creation date: 29/09/2016.
Références of this alert: CERTFR-2016-AVI-322, cisco-sa-20160928-h323, CSCux04257, CVE-2016-6384, VIGILANCE-VUL-20723.

Description of the vulnerability

The Cisco IOS or IOS XE product has a service to manage received H.323 packets.

However, when a malicious packet is received, a fatal error occurs.

An attacker can therefore send a malicious H.323 packet to Cisco IOS or IOS XE, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

This security vulnerability impacts software or systems such as Cisco Catalyst, IOS by Cisco, IOS XE Cisco, Cisco Router.

Our Vigil@nce team determined that the severity of this computer weakness bulletin is important.

The trust level is of type confirmed by the editor, with an origin of internet client.

An attacker with a expert ability can exploit this security note.

Solutions for this threat

Cisco IOS, IOS XE: solution CSCux04257.
The solution CSCux04257 is available:
  https://tools.cisco.com/bugsearch/bug/CSCux04257
  https://tools.cisco.com/quickview/bug/CSCux04257
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a networks vulnerabilities watch. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.