{"vuid":"VU#472582","idnumber":"472582","name":"Cisco IOS IPv6 denial-of-service vulnerability","keywords":["Cisco","IPv6","tunnel","crafted packet"],"overview":"A vulnerability in the way Cisco IOS handles IPv6 packets could result in a remotely exploitable denial of service.","clean_desc":"The Cisco Internetwork Operating System (IOS) includes support for processing Internet Protocol version 6 (IPv6) packets. A vulnerability in the way that IOS handles a sequence of specially crafted IPv6 packets could cause an affected device to reload (reboot), resulting in a denial of service. The specific nature of the crafted packets exploiting this vulnerability is not known. Only devices running IOS that have IPv6-configured interfaces, either physical or logical (e.g., tunnels), are vulnerable to this issue.","impact":"A remote attacker may be able to cause an affected device to reload, thereby creating a denial of service condition.","resolution":"Upgrade Cisco has addressed this issue in new versions of the IOS software. Please see Cisco's Security Advisory for more details.","workarounds":"","sysaffected":"","thanks":"Thanks to Cisco PSIRT for reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://www.cisco.com/pcgi-bin/Support/Bugtool/onebug.pl?bugid=CSCed40933","http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-01-26T12:59:50Z","publicdate":"2005-01-26T00:00:00Z","datefirstpublished":"2005-01-26T16:12:37Z","dateupdated":"2005-02-01T20:50:58Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"20","cam_population":"11","cam_impact":"7","cam_easeofexploitation":"14","cam_attackeraccessrequired":"15","cam_scorecurrent":"10.6115625","cam_scorecurrentwidelyknown":"12.1275","cam_scorecurrentwidelyknownexploited":"18.19125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.6115625,"vulnote":null}