CVE List
CNAs
Board
About
News & Blog Go to for: CVSS Scores CPE Info Advanced Search
Common Vulnerabilities and Exposures
Full-Screen View CVE-ID
CVE-2010-4670
Learn more at National Vulnerability Database (NVD) • CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
Description The Neighbor Discovery (ND) protocol implementation in the IPv6 stack on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(3) and earlier, and Cisco PIX Security Appliances devices, allows remote attackers to cause a denial of service (CPU consumption and device hang) by sending many Router Advertisement (RA) messages with different source addresses, as demonstrated by the flood_router6 program in the thc-ipv6 package, aka Bug ID CSCti24526.
References Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
MISC:http://events.ccc.de/congress/2010/Fahrplan/events/3957.en.html MISC:http://mirror.fem-net.de/CCC/27C3/mp3-audio-only/27c3-3957-en-ipv6_insecurities.mp3 MISC:http://mirror.fem-net.de/CCC/27C3/mp4-h264-HQ/27c3-3957-en-ipv6_insecurities.mp4 MISC:http://www.youtube.com/watch?v=00yjWB6gGy8 CONFIRM:http://www.cisco.com/en/US/docs/security/asa/asa82/release/notes/asarn82.pdf BID:45760 URL:http://www.securityfocus.com/bid/45760 SECTRACK:1024963 URL:http://www.securitytracker.com/id?1024963 XF:asa-pix-nd-dos(64598) URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/64598
Assigning CNA N/A
Date Entry Created 20110106
Disclaimer: The entry creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy) Assigned (20110106)
Votes (Legacy) Comments (Legacy) Proposed (Legacy) N/A This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities.
SEARCH CVE USING KEYWORDS: You can also search by reference using the CVE Reference Maps.
For More Information:
[email protected]
Submit