Korean
<< Back
VID 29143
Severity 30
Port 161
Protocol UDP
Class CISCO
Detailed Description The remote Cisco IOS device may have a denial of service vulnerability. An input queue wedge can occur when IOS is running on an Aironet Access Point. This results in clients being unable to be authenticated, resulting in a denial of service.

* Note: This check solely relied on the version number of the remote system to assess these vulnerabilities, so this might be a false positive. Also, it requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor. And also, if SGBP is disabled, please ignore this alert.

* References:
http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html


* Platforms Affected:
Cisco IOS versions 12.3, 12.4 and possibly other Cisco devices
Recommendation Upgrade to the fixed Cisco IOS version, as listed in Cisco Security Advisory (IAPP type 0x3281 packets wedge radio interface input queue:CSCtc12426) at http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html

Upgrades should be obtained through the Software Center on Cisco's worldwide web site at http://www.cisco.com
Related URL CVE-2012-1350 (CVE)
Related URL 54837 (SecurityFocus)
Related URL (ISS)