Bugzilla – Bug 984122
VUL-2: CVE-2016-1409: kernel-source: The Neighbor Discovery (ND) protocol implementation in the IPv6 stack (VR-206)
Last modified: 2020-06-29 06:25:17 UTC
CVE-2016-1409 The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS XE 2.1 through 3.17S, IOS XR 2.0.0 through 5.3.2, and NX-OS allows remote attackers to cause a denial of service (packet-processing outage) via crafted ND messages, aka Bug ID CSCuz66542, as exploited in the wild in May 2016. We have received notice from CERT, that this issue might affect all IPv6 processing Operating Systems. http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6 Summary A vulnerability in the IP Version 6 (IPv6) packet processing functions of multiple Cisco products could allow an unauthenticated, remote attacker to cause an affected device to stop processing IPv6 traffic, leading to a denial of service (DoS) condition on the device. The vulnerability is due to insufficient processing logic for crafted IPv6 packets that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 Neighbor Discovery packets to an affected device for processing. A successful exploit could allow the attacker to cause the device to stop processing IPv6 traffic, leading to a DoS condition on the device. This vulnerability is not Cisco specific: any IPv6 processing unit not capable of dropping such packets early in the processing path or in hardware is affected by this vulnerability. ...
Is there some (accessible) info about what do those crafted ND packets look like so that we can check if our kernels are vulnerable?
so far I have not seen more information
bugbot adjusting priority
We tried contacting CISCO on the details of this issue, but did not have success on getting more details at this time.
We have no further information on this. If new stuff appears we will reopen the bug.