A vulnerability in the IPv4 protocol handling of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory leak that occurs during packet processing. An attacker could exploit this vulnerability by sending a series of crafted IPv4 packets through an affected device. A successful exploit could allow the attacker to exhaust the available memory and cause an unexpected restart of the npusim process, leading to a DoS condition on the affected device.
References
Configurations
History
21 Nov 2024, 05:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr-mem-leak-dos-MTWGHKk3 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.8 |
Information
Published : 2021-01-20 20:15
Updated : 2024-11-21 05:44
NVD link : CVE-2021-1353
Mitre link : CVE-2021-1353
CVE.ORG link : CVE-2021-1353
JSON object : View
Products Affected
cisco
- virtualized_packet_core-single_instance
- asr_5500
- asr_5700
- asr_5000
- staros
CWE
CWE-401
Missing Release of Memory after Effective Lifetime