

In most cases this will be a maintenance upgrade to software that was previously purchased.

#Ipsecuritas split dns download
By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: Īdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner.
#Ipsecuritas split dns install
Customers may only install and expect support for software versions and feature sets for which they have purchased a license. Ip dns name-list 1 permit ^(.+\.)*8\.B\.D\.0\.1\.0\.0\.2\.IP6\.ARPA$Ĭisco has released free software updates that address the vulnerability described in this advisory. The following example shows the output of the show running-config | section ip dns command on a device that has the Split DNS feature enabled with a DNS name list applied: Split_DNS# show running-config | section ip dns

This advisory is part of the September 24, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 34 vulnerabilities. This advisory is available at the following link: There are no workarounds that address this vulnerability. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.Ĭisco has released software updates that address this vulnerability. An attacker could exploit this vulnerability by trying to resolve an address or hostname that the affected device handles. The vulnerability occurs because the regular expression (regex) engine that is used with the Split DNS feature of affected releases may time out when it processes the DNS name list configuration. A vulnerability in the Split DNS feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.
