-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Cisco IOS and IOS XE Software H.323 Message Validation 
Denial of Service Vulnerability

Advisory ID:  cisco-sa-20160928-h323

Revison: 1.0

For Public Release: 2016 September 28 16:00  GMT

+------------------------------------------------------------------------------

Summary
=======

A vulnerability in the H.323 subsystem of Cisco IOS and IOS XE Software could 
allow an unauthenticated, remote attacker to create a denial of service (DoS) 
condition on an affected device.

The vulnerability is due to a failure to properly validate certain fields in an 
H.323 protocol suite message. When processing the malicious message, the 
affected device may attempt to access an invalid memory region, resulting in a 
crash. An attacker who can submit an H.323 packet designed to trigger the 
vulnerability could cause the affected device to crash and restart.

Cisco has released software updates that address this vulnerability. There are 
no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-h323

This advisory is part of the September 28, 2016, release of the Cisco IOS and 
IOS XE Software Security Advisory Bundled Publication, which includes 10 Cisco 
Security Advisories that describe 11 vulnerabilities. All the vulnerabilities 
have a Security Impact Rating of High. For a complete list of the advisories 
and links to them, see Cisco Event Response: September 2016 Semiannual Cisco 
IOS and IOS XE Software Security Advisory Bundled Publication.

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=5oY6
-----END PGP SIGNATURE-----
_______________________________________________
apops mailing list
[email protected]
https://mailman.apnic.net/mailman/listinfo/apops
Website: www.apops.net

Reply via email to