A vulnerability in TCP connection handling when TCP sessions are terminated via a TCP FIN packet for the Cisco Videoscape Distribution Suite for Internet Streaming (VDS-IS) could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition.

The vulnerability is due to improper TCP session management when a TCP session is in TCP FIN waiting state.

The device could fail to respond properly to a new TCP SYN packet to start a new TCP connection.

An attacker could exploit this vulnerability by sending TCP traffic streams that could terminate the connection with a TCP FIN.

An exploit could allow the attacker to cause a partial DoS condition. When a TCP session is in a TCP FIN waiting state, it is possible that new incoming TCP SYN packets will be dropped silently.

Cisco has not released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160226-vds-is
A vulnerability in TCP connection handling when TCP sessions are terminated via a TCP FIN packet for the Cisco Videoscape Distribution Suite for Internet Streaming (VDS-IS) could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition.

The vulnerability is due to improper TCP session management when a TCP session is in TCP FIN waiting state.

The device could fail to respond properly to a new TCP SYN packet to start a new TCP connection.

An attacker could exploit this vulnerability by sending TCP traffic streams that could terminate the connection with a TCP FIN.

An exploit could allow the attacker to cause a partial DoS condition. When a TCP session is in a TCP FIN waiting state, it is possible that new incoming TCP SYN packets will be dropped silently.

Cisco has not released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160226-vds-is

Security Impact Rating: Medium

CVE: CVE-2016-1353