
====================================================================

                                 CERT-Renater

                      Note d'Information No. 2016/VULN137
_____________________________________________________________________

DATE                : 24/03/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Cisco IOS, Cisco NX-OS Software.

======================================================================
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-lisp
_____________________________________________________________________

Cisco Security Advisory: Cisco IOS and NX-OS Software Locator/ID
Separation Protocol Packet Denial of Service Vulnerability

Advisory ID: cisco-sa-20160323-lisp

Revision 1.0

For Public Release 2016 March 23 16:00  GMT

+---------------------------------------------------------------------

Summary
=======

A vulnerability in the Locator/ID Separation Protocol (LISP) of Cisco
IOS Software running on the Cisco Catalyst 6500 and 6800 Series
Switches and Cisco NX-OS Software running on the Cisco Nexus 7000 and
Nexus 7700 Series Switches with an M1 Series Gigabit Ethernet Module
could allow an unauthenticated, remote attacker to cause a reload of
the vulnerable device.

The vulnerability is due to a lack of proper input validation when a
malformed LISP packet header is received. An attacker could exploit
this vulnerability by sending a malformed LISP packet on UDP port 4341.
An exploit could allow the attacker to cause a denial of service (DoS)
condition.

Cisco has released software updates that address this vulnerability.

This advisory is available at the following link:

 
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-lisp

This advisory is part of the March 23, 2016, release of the Cisco IOS
and IOS XE Software Security Advisory Bundled Publication, which
includes six Cisco Security Advisories that describe six
vulnerabilities. All the vulnerabilities have a Security Impact Rating
of "High." For a complete list of advisories and links to them, see
Cisco Event Response:
http://www.cisco.com/c/en/us/about/security-center/event-response/cisco-erp-march-2016.html

==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================




