VID |
29143 |
Severity |
30 |
Port |
161 |
Protocol |
UDP |
Class |
CISCO |
Detailed Description |
The remote Cisco IOS device may have a denial of service vulnerability. An input queue wedge can occur when IOS is running on an Aironet Access Point. This results in clients being unable to be authenticated, resulting in a denial of service.
* Note: This check solely relied on the version number of the remote system to assess these vulnerabilities, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor. And also, if SGBP is disabled, please ignore this alert.
* References: http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html
* Platforms Affected: Cisco IOS versions 12.3, 12.4 and possibly other Cisco devices |
Recommendation |
Upgrade to the fixed Cisco IOS version, as listed in Cisco Security Advisory (IAPP type 0x3281 packets wedge radio interface input queue:CSCtc12426) at http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html Upgrades should be obtained through the Software Center on Cisco's worldwide web site at http://www.cisco.com |
Related URL |
CVE-2012-1350 (CVE) |
Related URL |
54837 (SecurityFocus) |
Related URL |
(ISS) |
|