漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability in the peer-to-peer message processing functionality of Cisco Packet Data Network Gateway could allow an unauthenticated, remote attacker to cause the Session Manager (SESSMGR) process on an affected device to restart, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect validation of peer-to-peer packet headers. An attacker could exploit this vulnerability by sending a crafted peer-to-peer packet through an affected device. A successful exploit could allow the attacker to cause the SESSMGR process on the affected device to restart unexpectedly, which could briefly impact traffic while the SESSMGR process restarts and result in a DoS condition. Cisco Bug IDs: CSCvg88786.
漏洞信息
N/A
漏洞
输入验证不恰当
漏洞
Cisco Packet Data Network Gateway 输入验证漏洞
漏洞信息
Cisco Packet Data Network Gateway是美国思科(Cisco)公司的一款用于4G移动核心网络中的分组数据网络网关设备。 Cisco Packet Data Network Gateway中的对等网络消息处理存在输入验证漏洞,该漏洞源于程序没有正确的校验对等网络数据包头。远程攻击者可通过发送对等网络数据包利用该漏洞造成拒绝服务(Session Manager进程重启)。
漏洞信息
N/A
漏洞
N/A