Cisco Systems, Inc. (NMS: CSCO) has released a security advisory focused on key components susceptible to DoS and Privilege Escalation vulnerabilities inherent in the networking giant’s Wireless LAN Controllers, Catalyst 6500 Wireless Services Modules, and last but not least their superb (in our opinion) Catalyst 3750 Integrated Wireless LAN Controllers. The company has issued patches for the enumerated issues. There are no workarounds outside of the patch activity. The full advisory appears after the jump. Get patching folks.
Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers
Advisory ID: cisco-sa-20090204-wlc
Revision 1.0
For Public Release 2009 February 04 1600 UTC (GMT)
Summary
=======
Multiple vulnerabilities exist in the Cisco Wireless LAN Controllers (WLCs), Cisco Catalyst 6500 Wireless Services Modules (WiSMs), and Cisco Catalyst 3750 Integrated Wireless LAN Controllers. This security advisory outlines details of the following vulnerabilities:
* Denial of Service Vulnerabilities (total of three)
* Privilege Escalation Vulnerability
These vulnerabilities are independent of each other.
Cisco has released free software updates that address these vulnerabilities.
There are no workarounds available for these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090204-wlc.shtml.
Affected Products
=================
Vulnerable Products
+——————
The following products and software versions are affected for each vulnerability.
Denial of Service Vulnerabilities
+——————————–
Two denial of service (DoS) vulnerabilities affect software versions 4.2 and later. All Cisco Wireless LAN Controller (WLC) platforms are affected. A third DoS vulnerability affects software versions 4.1 and later. The following platforms are affected by this vulnerability:
* Cisco 4400 Series Wireless LAN Controllers
* Cisco 4100 Series Wireless LAN Controllers
* Cisco Catalyst 6500 Series/7600 Series Wireless Services Module (WiSM)
* Cisco Catalyst 3750 Series Integrated Wireless LAN Controllers
Note: The Cisco Wireless LAN Controller Modules supported on Cisco 2800 and 3800 series Integrated Services Routers are not vulnerable. The Cisco 2000 and 2100 Series Wireless LAN Controllers are also not affected by this vulnerability.
Privilege Escalation Vulnerability
+———————————
Only WLC software version 4.2.173.0 is affected by this vulnerability.
Determination of Software Versions
+———————————
To determine the WLC version that is running in a given environment, use one of the following methods:
* In the web interface, choose the Monitor tab, click Summary in the left pane, and note the Software Version.
* From the command-line interface, type “show sysinfo” and note the Product Version, as shown in the following example:
(Cisco Controller) >show sysinfo
Manufacturer’s Name.. Cisco Systems Inc.
Product Name……… Cisco Controller
Product Version…… 5.1.151.0
RTOS Version……… Linux-2.6.10_mvl401
Bootloader Version… 4.0.207.0
Build Type……….. DATA + WPS
1 comment:
HI
I think this may be great point.
Diet Plan
,
Walk In Clinic
,
Healthy Diet Foods
,
Health and Medicine
,
Pakistani Real estate
,
JObs opportunities for us
,
Travel In Pakistan
Post a Comment