
====================================================================

                               CERT-Renater

                    Note d'Information No. 2016/VULN136
_____________________________________________________________________

DATE                : 24/03/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Cisco IOS XE, Cisco IOS.

======================================================================
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software DHCPv6 Relay
Denial of Service Vulnerability

Advisory ID: cisco-sa-20160323-dhcpv6

Revision 1.0

For Public Release 2016 March 23 16:00  GMT

+---------------------------------------------------------------------

Summary
=======

A vulnerability in the DHCP version 6 (DHCPv6) relay feature of Cisco
IOS and IOS XE Software could allow an unauthenticated, remote attacker
to cause an affected device to reload.

The vulnerability is due to insufficient validation of DHCPv6 relay
messages. An attacker could exploit this vulnerability by sending a
crafted DHCPv6 relay message to an affected device. A successful
exploit could allow the attacker to cause the affected device to
reload, resulting in a denial of service (DoS) condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6

This advisory is part of the March 23, 2016, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes six Cisco Security Advisories that describe six
vulnerabilities. All the vulnerabilities have a Security Impact Rating
of "High." For a complete list of advisories and links to them, see
Cisco Event Response:
http://www.cisco.com/c/en/us/about/security-center/event-response/cisco-erp-march-2016.html

_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Internet Key
Exchange Version 2 Fragmentation Denial of Service Vulnerability

Advisory ID: cisco-sa-20160323-ios-ikev2

Revision 1.0

For Public Release 2016 March 23 16:00  GMT

+---------------------------------------------------------------------

Summary
=======

A vulnerability in the Internet Key Exchange (IKE) version 2 (v2)
fragmentation code of Cisco IOS and IOS XE Software could allow an
unauthenticated, remote attacker to cause a reload of the affected
system.

The vulnerability is due to an improper handling of crafted, fragmented
IKEv2 packets. An attacker could exploit this vulnerability by sending
crafted UDP packets to the affected system. An exploit could allow the
attacker to cause a reload of the affected system.

Note: Only traffic directed to the affected system can be used to
exploit this vulnerability. This vulnerability can be triggered by IPv4
and IPv6 traffic.

Cisco has released software updates that address this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2

This advisory is part of the March 23, 2016, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes six Cisco Security Advisories that describe six
vulnerabilities. All the vulnerabilities have a Security Impact Rating
of "High." For a complete list of advisories and links to them, see
Cisco Event Response:
http://www.cisco.com/c/en/us/about/security-center/event-response/cisco-erp-march-2016.html
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and IOS XE Software Smart Install
Denial of Service Vulnerability

Advisory ID: cisco-sa-20160323-smi

Revision 1.0

For Public Release 2016 March 23 16:00  GMT

+---------------------------------------------------------------------

Summary
=======

The Smart Install client feature in Cisco IOS and IOS XE Software
contains a vulnerability that could allow an unauthenticated, remote
attacker to cause a denial of service (DoS) condition on an affected
device.

The vulnerability is due to incorrect handling of image list
parameters. An attacker could exploit this vulnerability by sending
crafted Smart Install packets to TCP port 4786. A successful exploit
could cause a Cisco Catalyst switch to reload, resulting in a DoS
condition.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability other than
disabling Smart Install functionality on the vulnerable device.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi

This advisory is part of the March 23, 2016, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes six Cisco Security Advisories that describe six
vulnerabilities. All the vulnerabilities have a Security Impact Rating
of "High." For a complete list of advisories and links to them, see
Cisco Event Response:
http://www.cisco.com/c/en/us/about/security-center/event-response/cisco-erp-march-2016.html


==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================



