The BGP implementation in Cisco NX-OS 6.2(2a) and earlier does not properly handle the interaction of UPDATE messages with IPv6, VPNv4, and VPNv6 labeled unicast-address families, which allows remote attackers to cause a denial of service (peer reset) via a crafted message, aka Bug ID CSCuj03174.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6982 | Vendor Advisory |
http://tools.cisco.com/security/center/viewAlert.x?alertId=32325 | Vendor Advisory |
http://osvdb.org/101713 | |
http://www.securitytracker.com/id/1029568 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/64670 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/56169 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90119 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-01-08 13:55
Updated : 2017-08-28 18:34
NVD link : CVE-2013-6982
Mitre link : CVE-2013-6982
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
cisco
- nx-os