A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97266 | Third Party Advisory VDB Entry |
https://cxsecurity.com/issue/WLB-2017030242 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/41752/ | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/97266 | Third Party Advisory VDB Entry |
https://cxsecurity.com/issue/WLB-2017030242 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/41752/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/97266 - Third Party Advisory, VDB Entry | |
References | () https://cxsecurity.com/issue/WLB-2017030242 - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/41752/ - Exploit, Third Party Advisory |
Information
Published : 2017-03-29 14:59
Updated : 2024-11-21 03:31
NVD link : CVE-2017-7285
Mitre link : CVE-2017-7285
CVE.ORG link : CVE-2017-7285
JSON object : View
Products Affected
mikrotik
- routeros
CWE
CWE-400
Uncontrolled Resource Consumption