Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet Security.ca and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet Security.ca today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!

Cisco patches 2 security vulnerabilities and a remote denial of service bug

Sponsered ads:
Read the latest IT news. Visit ItDirection.net. Updated several times daily.

If you need reliability when it comes to SMTP servers, get the best, get Port 587.

Get a powerful Linux Dual-Core dedicated server for less than $2.67 a day!

Share on Twitter.

July 15, 2016

Cisco said earlier today it has patched two security vulnerabilities, including a remote denial of service bug in its Network Convergence System routers.

Potential hackers can send packets to TCP listening ports running SSH, secure copy protocol, and secure FTP that can overwhelm NCS 6000 routers and cause processors to reload, sometimes in an endless loop.

Cisco rates the security vulnerability (CVE-2016-1426) as highly critical since it offers a method to remotely disrupt routers in certain specific network configurations.

"The security vulnerability is due to the improper management of system timer resources," Cisco added in an advisory.

"An exploit could allow the attacker to cause a leak of system timer resources, leading to a non-operational state and an eventual reload of the route processor on the affected platform," Cisco added.

The second security flaw is graded medium severity and strikes SNMP configuration management messes in ASR 5000 enterprise routers older than versions 19.5 and 20.1.

It could allow hackers to change device configurations using SNMP community strings. "An attacker could perform an SNMP query to the affected device to view the SNMP community string," Cisco asserts.

"A security exploit could allow the attacker to read and modify the device configuration using the disclosed SNMP read-write community string," it added.

There are no workarounds available for either security bugs meaning that system admins must apply the patch or risk the chance of some downtime.

Source: Cisco.

Sponsered ads:
Read the latest IT news. Visit ItDirection.net. Updated several times daily.

If you need reliability when it comes to SMTP servers, get the best, get Port 587.

Get a powerful Linux Dual-Core dedicated server for less than $2.67 a day!

Share on Twitter.


Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact
Copyright © Internet Security.ca    Terms of use    Privacy agreement    Legal disclaimer