-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.1994
            Cisco ASR 1000 Series Aggregation Services Routers
             Fragmented Packet Denial of Service Vulnerability
                               31 July 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco ASR 1000 Series
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-4291  

Original Bulletin: 
   http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150730-asr1k

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Cisco ASR 1000 Series Aggregation Services Routers Fragmented Packet Denial of Service Vulnerability

Advisory ID: cisco-sa-20150730-asr1k

Revision 1.0

For Public Release 2015 July 30 16:00  UTC (GMT)

+-----------------------------------------------------------------------

Summary
=======
A vulnerability in the code handling the reassembly of fragmented IP version 4 (IPv4) or IP version 6 (IPv6) packets of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause a crash of the Embedded Services Processor (ESP) processing the packet.

The vulnerability is due to improper processing of crafted, fragmented packets. An attacker could exploit this vulnerability by sending a crafted sequence of fragmented packets. An exploit could allow the attacker to cause a reload of the affected platform.

Cisco has released software updates that address this vulnerability.

There are no workarounds to mitigate this vulnerability.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150730-asr1k

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
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=bOtY
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVbrh736ZAP0PgtI9AQKG2hAAl5a8q6Wrl7mpTD80cxPMhHPmO8IJH2Ez
/6yYbt7TjFT9V3M26dx3xJ/Jp5mHHocnisxskvWQV1k3j1fr875VovMP0uwHeJ6p
3EQzTOU39fX7Ey/7lwm3hM2EuHdwa2I1A4e2fWSv4FUUs3OYsF6QHp/kWPAAgRrQ
nxFALHVq0MDEZHva7mtqol71jlNpang2t6OuDPs1LjSVV8WMTzC/174OgW1Tvw0e
9EcKDHmml9mg+Vlxx75C1ZYoSLMQPwAzjYKMchPKFj16V+f0zAPJPikc3upxJF3y
i4z0Tq3I4Df99WDWvRFySuju9Q2WYwNVO/monLyAXEcuXr+OtDmkLsZ3ojL0Zl/9
gwXcJIxeNDsTeLNkthi9eAwQRwveOrw9iMpC03ynLyRBCFw/AxgaCuHyVXGYPPBm
HJQn29Ny/azTa3ffng03cegejn4G1nQqf5bLUVSIJyAIYFcBvZTcLMfmtLnzCw5C
g3DKN9rzuYtkiSEYW18SyM6TcbhFucAzwuDgALn9fo20RLv6l8ikWmQtWi6LqvcX
SSfRkM1JILQwRuTNoYlf+1fIHxW6F9fEPi8+4o8TQBaPYis+kMVQBH0qZ+07980N
Yl92x6csO5VY+jTf2QVpSQG+dBWIG0ojqzeG9FkpHTSpJRBMoCOxrHaUizYtmm34
QdYeDOzMxbk=
=/Yfv
-----END PGP SIGNATURE-----