2 results (0.002 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the memory buffer of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause memory leaks that could eventually lead to a device reboot. This vulnerability is due to memory leaks caused by multiple clients connecting under specific conditions. An attacker could exploit this vulnerability by causing multiple wireless clients to attempt to connect to an access point (AP) on an affected device. A successful exploit could allow the attacker to cause the affected device to reboot after a significant amount of time, resulting in a denial of service (DoS) condition. Una vulnerabilidad en el búfer de memoria del software AireOS del Cisco Wireless LAN Controller (WLC) podría permitir que un atacante adyacente no autenticado cause pérdidas de memoria que eventualmente podrían provocar el reinicio del dispositivo. Esta vulnerabilidad se debe a pérdidas de memoria causadas por la conexión de varios clientes en condiciones específicas. • https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-dos-YSmbUqX3 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Cisco AireOS 4.1 through 7.4.120.0, 7.5.x, and 7.6.100.0 on Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug ID CSCun86747. Cisco AireOS 4.1 hasta la versión 7.4.120.0, 7.5.x y 7.6.100.0 sobre dispositivos Wireless LAN Controller (WLC) permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de una petición HTTP manipulada, también conocida como Bug ID CSCun86747. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-wlc http://www.securitytracker.com/id/1035634 • CWE-399: Resource Management Errors •