Cisco Blog » The Platform

2016年7月3日星期日

Cisco Notification Alert -ASR 5000 Series Mobile Wireless EPC-04-Jul-2016 05:39 GMT

 

 

 

 

 

 

 


End-of-Sale and End-of-Life Announcements - ASR 5000 Series

Title:
End-of-Sale and End-of-Life Announcement for the Policy Access Server Hardware
Description:

Cisco announces the end-of-sale and end-of-life dates for the Policy Access Server Hardware. The last day to order the affected product(s) is December 29, 2016. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract.

Date:
30-JUN-2016

Find additional information in End-of-Sale and End-of-Life Products

Security Advisories & Responses - ASR 5000 Series

Title:
Cisco Products IPv6 Neighbor Discovery Crafted Packet Denial of Service Vulnerability
Description:

A vulnerability in the IP Version 6 (IPv6) packet processing functions of multiple Cisco products could allow an unauthenticated, remote attacker to cause an affected device to stop processing IPv6 traffic, leading to a denial of service (DoS) condition on the device.

The vulnerability is due to insufficient processing logic for crafted IPv6 packets that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 Neighbor Discovery (ND) packets to an affected device for processing. A successful exploit could allow the attacker to cause the device to stop processing IPv6 traffic, leading to a DoS condition on the device.

This vulnerability is not Cisco specific: any IPv6 processing unit not capable of dropping such packets early in the processing path or in hardware is affected by this vulnerability.

Cisco will release software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6

Date:
01-JUL-2016

Find additional information in Cisco Security Advisories & Responses

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论