Brocade Security Advisory

Brocade Security Advisory ID:

BSA-2016-168

 

Risk Impact:

High

Initial Publication Date:

October 03, 2016

 

Workaround:

N/A

Last Updated:

October 03, 2016

 

Component:

NetIron

Revision:

1.0: Final

 

CVSS Score:

7.5

 

Affected CVE(s):

CVE-2016-8203

 

 

 

 

 

 

 

Summary

A memory corruption in the IPsec code path of Brocade NetIron OS on Brocade MLXs 5.8.00 through 5.8.00e, 5.9.00 through 5.9.00bd, 6.0.00 and 6.0.00a images could allow attackers to cause a denial of service (line card reset) via certain constructed IPsec control packets.

Affected Products

Product

Current Assessment

Brocade NetIron

Impacted: All Brocade MLX Line Cards running NetIron 5.8.00 through 5.8.00, 5.9.00 through 5.9.00bd, 6.0.00, and 6.00a images.

Products Confirmed Not Vulnerable

Brocade NetIron CES/CER and/or any Brocade NetIron software version prior to 5.8.00 are not affected.

Solution

Brocade strongly recommends that all customers running the impacted version(s) install the patch.

 

Brocade has fixed the vulnerability described in this advisory in NetIron 5.8.00ec, 5.9.00be and 6.0.00ab and later releases. The patch releases have been posted to the MyBrocade web portal.

Workaround

There are no workarounds that address this vulnerability.

Revision History

Version

Change

Date

1.0

Initial Publication

October 03, 2016

 

 

 

 

 

 

 

 

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.