Resource management errors in Cisco 5500 Series Wireless Controllers - CVE-2018-0252
Published: May 7, 2018
Vulnerability identifier: #VU12375
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0252
CWE-ID: CWE-399
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco 5500 Series Wireless Controllers
Cisco 5500 Series Wireless Controllers
Detailed vulnerability description
The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.
The weakness exists in the IP Version 4 (IPv4) fragment reassembly function due to a corruption of an internal data structure process that occurs when the affected software reassembles certain IPv4 packets. A remote attacker can send specially crafted IPv4 fragments and cause the service to crash.
The weakness exists in the IP Version 4 (IPv4) fragment reassembly function due to a corruption of an internal data structure process that occurs when the affected software reassembles certain IPv4 packets. A remote attacker can send specially crafted IPv4 fragments and cause the service to crash.
How to mitigate CVE-2018-0252
Update to versions 8.7(102.0), 8.7(1.68), 8.6(101.0), 8.6(1.135), 8.5(110.0) or 8.5(107.64).