Qthi paste mail in cases co ban nao can fix the bug:
-----------------------------------------
Cisco(R) Technical Assistance Center
News Flash - July 18, 2003
-----------------------------------------
Cisco Security Advisory: Cisco IOS(R) Interface Blocked
by IPv4 Packets: Free Software Available To Correct the Problem
-----------------------------------------
Cisco routers and switches running Cisco IOS software and configured
to process Internet Protocol version 4 (IPv4) packets are vulnerable
to a Denial of Service (DoS) attack. Multiple IPv4 packets with
specific protocol fields sent directly to the device may cause the
input interface to stop processing traffic once the input queue is
full. No authentication is required to process the inbound packet.
Processing of IPv4 packets is enabled by default. Devices running
only IP version 6 (IPv6) are not affected.
Cisco has made software available, free of charge, to correct the
problem.
We recommend that you follow the instructions in this workaround
to protect your networks:
For more details, including instructions for obtaining fixed software,
read the complete security advisory at:
-----------------------------------------
Following is the link from groupstudy.com
Regards,
-----------------------------------------
Cisco(R) Technical Assistance Center
News Flash - July 18, 2003
-----------------------------------------
Cisco Security Advisory: Cisco IOS(R) Interface Blocked
by IPv4 Packets: Free Software Available To Correct the Problem
-----------------------------------------
Cisco routers and switches running Cisco IOS software and configured
to process Internet Protocol version 4 (IPv4) packets are vulnerable
to a Denial of Service (DoS) attack. Multiple IPv4 packets with
specific protocol fields sent directly to the device may cause the
input interface to stop processing traffic once the input queue is
full. No authentication is required to process the inbound packet.
Processing of IPv4 packets is enabled by default. Devices running
only IP version 6 (IPv6) are not affected.
Cisco has made software available, free of charge, to correct the
problem.
We recommend that you follow the instructions in this workaround
to protect your networks:
For more details, including instructions for obtaining fixed software,
read the complete security advisory at:
-----------------------------------------
Following is the link from groupstudy.com
Regards,
Comment