Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8pvv-mj79-jpcq

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The BGP implementation in Cisco NX-OS 6.2(2a) and earlier does not properly handle the interaction of UPDATE messages with IPv6, VPNv4, and VPNv6 labeled unicast-address families, which allows remote attackers to cause a denial of service (peer reset) via a crafted message, aka Bug ID CSCuj03174.

The BGP implementation in Cisco NX-OS 6.2(2a) and earlier does not properly handle the interaction of UPDATE messages with IPv6, VPNv4, and VPNv6 labeled unicast-address families, which allows remote attackers to cause a denial of service (peer reset) via a crafted message, aka Bug ID CSCuj03174.

EPSS

Процентиль: 79%
0.01292
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
около 12 лет назад

The BGP implementation in Cisco NX-OS 6.2(2a) and earlier does not properly handle the interaction of UPDATE messages with IPv6, VPNv4, and VPNv6 labeled unicast-address families, which allows remote attackers to cause a denial of service (peer reset) via a crafted message, aka Bug ID CSCuj03174.

EPSS

Процентиль: 79%
0.01292
Низкий

Дефекты

CWE-20