Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v6fm-cxxx-62h6

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The NTP implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.1, and IOS XE 2.1 through 3.3, does not properly handle encapsulation of multicast NTP packets within MSDP SA messages, which allows remote attackers to cause a denial of service (device reload) by leveraging an MSDP peer relationship, aka Bug ID CSCuc81226.

The NTP implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.1, and IOS XE 2.1 through 3.3, does not properly handle encapsulation of multicast NTP packets within MSDP SA messages, which allows remote attackers to cause a denial of service (device reload) by leveraging an MSDP peer relationship, aka Bug ID CSCuc81226.

EPSS

Процентиль: 60%
0.00399
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 12 лет назад

The NTP implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.1, and IOS XE 2.1 through 3.3, does not properly handle encapsulation of multicast NTP packets within MSDP SA messages, which allows remote attackers to cause a denial of service (device reload) by leveraging an MSDP peer relationship, aka Bug ID CSCuc81226.

EPSS

Процентиль: 60%
0.00399
Низкий

Дефекты

CWE-20