Vulnerabilities > CVE-2019-1869 - Access of Uninitialized Pointer vulnerability in Cisco Staros
Summary
A vulnerability in the internal packet-processing functionality of the Cisco StarOS operating system running on virtual platforms could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error that may occur under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to prevent the targeted service interface from receiving any traffic, which would lead to a DoS condition on the affected interface. The device may have to be manually reloaded to recover from exploitation of this vulnerability.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | CISCO |
NASL id | CISCO-SA-20190619-STAROS-ASR-DOS.NASL |
description | According to its self-reported version, Cisco ASR 5000 Series Software is affected by a denial-of-service vulnerability. An unauthenticated, remote attacker can exploit this, via a series of specially crafted packets, to prevent the interface from receiving traffic. Please see the included Cisco BIDs and Cisco Security Advisory for more information. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 126340 |
published | 2019-06-28 |
reporter | This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/126340 |
title | Cisco StarOS Denial of Service Vulnerability |