Vigil@nce - Cisco, Junos: denial of service via IPv6 Neighbor Discovery
July 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can send a malicious IPv6 Neighbor Discovery packet to
Cisco or Junos, in order to trigger a denial of service.
Impacted products: ASA, Cisco Catalyst, IOS by Cisco, IOS XE
Cisco, IOS XR Cisco, Cisco Nexus, NX-OS, Cisco Router, Juniper
J-Series, JUNOS.
Severity: 2/4.
Creation date: 26/05/2016.
Revisions dates: 27/05/2016, 01/06/2016, 02/06/2016, 06/06/2016,
04/07/2016.
DESCRIPTION OF THE VULNERABILITY
The Cisco or Junos product has a service to manage received IPv6
Neighbor Discovery packets.
However, when a malicious packet is received, a fatal error occurs.
An attacker can therefore send a malicious IPv6 Neighbor Discovery
packet to Cisco or Junos, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Cisco-Junos-denial-of-service-via-IPv6-Neighbor-Discovery-19702