Cisco Gateway GPRS Support Node TCP Invalid Packet Vulnerability

Related Vulnerabilities: CVE-2015-4201  

A vulnerability in the TCP packet input handler of the Cisco Gateway GPRS Support Node (GGSN) could allow an unauthenticated, remote attacker to cause a reset of the Session Manager application. The vulnerability is due to improper input validation of the length fields of the TCP/IP header. An attacker could exploit this vulnerability by sending a crafted TCP packet with an invalid TCP/IP header. A successful exploit could allow the attacker to cause the Session Manager application on an affected device to restart, resulting in a DoS condition. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, the attacker must send a crafted TCP packet with an invalid TCP/IP header to the targeted system, making exploitation more difficult in environments that restrict network access from untrusted sources. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.