Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2015-6289 |
CWE-ID | CWE-399 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
|
Vendor |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU16
Risk: Medium
CVSSv3.1: 7.9 [AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2015-6289
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to an error when handling invalid TCP packets. A remote unauthenticated attacker can send multiple TCP packets to affected device and cause it to use all available memory resources.
Successful exploitation of this vulnerability will result in denial of service.
Note: this vulnerability was originally reported in OpenSSH service, however it affects other services as well.
MitigationCybersecurity Help is not aware of any official solution to address this vulnerability.
Vulnerable software versions External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.