Brocade Security Advisory

Brocade Security Advisory ID:

BSA-2017-248

 

Risk Impact:

High

Initial Publication Date:

April 28, 2017

 

Workaround:

N/A

Last Updated:

 

 

Component:

IPV6

Revision:

1.0: Interim

 

CVSS Score:

8.6

 

Affected CVE(s):

CVE-2016-10142

 

 

 

 

 

 

 

Summary

An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946].

Affected Products

Product

Current Assessment

Brocade FastIron OS

Impacted: Fixed in 08.0.61.

Brocade NetIron OS

Impacted: Fixed in 6.2.

Brocade ServerIron ADX

Impacted: Fixed in 12.5.02p.

Products Confirmed Not Vulnerable

Brocade Network Advisor, Brocade Network OS, Brocade SDN Controller, and Brocade Services Director are confirmed not affected by this vulnerability.

Workaround

There are no workarounds that address this vulnerability.

Revision History

Version

Change

Date

1.0

Initial Publication

April 28, 2017

 

 

 

Disclaimer

THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.