The ipv6 component in Cisco IOS before 15.1(4)M1.3 allows remote attackers to conduct fingerprinting attacks and obtain potentially sensitive information about the presence of the IOS operating system via an ICMPv6 Echo Request packet containing a Hop-by-Hop (HBH) extension header (EH) with a 0x0c01050c value in the PadN option data, aka Bug ID CSCtq02219.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0 | Vendor Advisory |
http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor | Broken Link |
Configurations
Information
Published : 2011-10-21 19:59
Updated : 2020-05-11 10:49
NVD link : CVE-2011-2059
Mitre link : CVE-2011-2059
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
cisco
- ios