A vulnerability in DNS over IPv6 packet processing for Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper length validation of a field in an IPv6 DNS packet. An attacker could exploit this vulnerability by sending a crafted DNS query over IPv6, which traverses the affected device. An exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. This vulnerability is specific to DNS over IPv6 traffic only.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2020-05-06T16:41:16.093868Z
Updated: 2024-11-15T17:25:21.757Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3191
Vulnrichment
Updated: 2024-08-04T07:24:00.910Z
NVD
Status : Modified
Published: 2020-05-06T17:15:12.290
Modified: 2024-11-21T05:30:30.980
Link: CVE-2020-3191
Redhat
No data.