Bug 984122 (CVE-2016-1409) - VUL-2: CVE-2016-1409: kernel-source: The Neighbor Discovery (ND) protocol implementation in the IPv6 stack (VR-206)
Summary: VUL-2: CVE-2016-1409: kernel-source: The Neighbor Discovery (ND) protocol imp...
Status: RESOLVED NORESPONSE
Alias: CVE-2016-1409
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Marcus Meissner
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/169581/
Whiteboard: CVSSv2:SUSE:CVE-2016-1409:5.0:(AV:N/...
Keywords:
Depends on:
Blocks:
 
Reported: 2016-06-10 09:36 UTC by Marcus Meissner
Modified: 2020-06-29 06:25 UTC (History)
9 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2016-06-10 09:36:46 UTC
CVE-2016-1409

The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco
IOS XE 2.1 through 3.17S, IOS XR 2.0.0 through 5.3.2, and NX-OS allows remote
attackers to cause a denial of service (packet-processing outage) via crafted ND
messages, aka Bug ID CSCuz66542, as exploited in the wild in May 2016.

We have received notice from CERT, that this issue might affect all IPv6 processing Operating Systems.

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160525-ipv6


Summary

    A vulnerability in the IP Version 6 (IPv6) packet processing functions of multiple Cisco products could allow an unauthenticated, remote attacker to cause an affected device to stop processing IPv6 traffic, leading to a denial of service (DoS) condition on the device.

    The vulnerability is due to insufficient processing logic for crafted IPv6 packets that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 Neighbor Discovery packets to an affected device for processing. A successful exploit could allow the attacker to cause the device to stop processing IPv6 traffic, leading to a DoS condition on the device.

    This vulnerability is not Cisco specific: any IPv6 processing unit not capable of dropping such packets early in the processing path or in hardware is affected by this vulnerability.
...
Comment 1 Michal Kubeček 2016-06-10 11:22:43 UTC
Is there some (accessible) info about what do those crafted ND packets look like so that we can check if our kernels are vulnerable?
Comment 2 Marcus Meissner 2016-06-10 12:59:01 UTC
so far I have not seen more information
Comment 4 Swamp Workflow Management 2016-06-10 22:00:31 UTC
bugbot adjusting priority
Comment 14 Marcus Meissner 2016-12-19 08:32:08 UTC
We tried contacting CISCO on the details of this issue, but did not have success on getting more details at this time.
Comment 15 Marcus Meissner 2018-02-09 06:15:40 UTC
We have no further information on this. If new stuff appears we will reopen the bug.