The ipv6 component in Cisco IOS before 15.1(4)M1.3 allows remote attackers to conduct fingerprinting attacks and obtain potentially sensitive information about the presence of the IOS operating system via an ICMPv6 Echo Request packet containing a Hop-by-Hop (HBH) extension header (EH) with a 0x0c01050c value in the PadN option data, aka Bug ID CSCtq02219.
References
Configurations
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor - Broken Link | |
References | () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0 - Vendor Advisory |
Information
Published : 2011-10-22 02:59
Updated : 2024-11-21 01:27
NVD link : CVE-2011-2059
Mitre link : CVE-2011-2059
CVE.ORG link : CVE-2011-2059
JSON object : View
Products Affected
cisco
- ios
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor