A vulnerability in the Link Layer Discovery Protocol (LLDP) implementation for Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition when the device unexpectedly reloads. The vulnerability is due to improper input validation of certain type, length, value (TLV) fields of the LLDP frame header. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface on the targeted device. A successful exploit could allow the attacker to cause the switch to reload unexpectedly.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105674 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041919 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-fxnx-os-dos | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2018-10-17T00:00:00
Updated: 2018-10-20T09:57:01
Reserved: 2017-11-27T00:00:00
Link: CVE-2018-0395
JSON object: View
NVD Information
Status : Modified
Published: 2018-10-17T19:29:00.303
Modified: 2023-04-20T17:17:59.437
Link: CVE-2018-0395
JSON object: View
Redhat Information
No data.
CWE