lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 25 Jan 2007 00:43:20 -0800
From: "Ted Mittelstaedt" <tedm@...box.placo.com>
To: <andre@...rations.net>, "Kevin Graham" <mahargk@...il.com>
Cc: full-disclosure@...ts.grok.org.uk, nanog@...it.edu,
	cisco-nsp@...k.nether.net
Subject: Re: [c-nsp] Cisco Security Advisory: Crafted IP
	Option Vulnerability


----- Original Message ----- 
From: "Andre Gironda" <andre@...rations.net>
To: "Kevin Graham" <mahargk@...il.com>
Cc: <full-disclosure@...ts.grok.org.uk>; <nanog@...it.edu>;
<cisco-nsp@...k.nether.net>
Sent: Wednesday, January 24, 2007 11:38 PM
Subject: Re: [c-nsp] Cisco Security Advisory: Crafted IP Option
Vulnerability


> I would say that this would work:
>
http://addxorrol.blogspot.com/2007/01/one-of-most-amusing-new-features-of.html
>
>
> So it's too late.  Don't bother upgrading now; you're already owned.
> Unless they are blocking it at the ISP borders in the same way they
> blocked out the Cisco IPv4 Crafted DoS vulnerability in 2003.  ISP's
> probably got the patch (or at least Cisco's ISP's did) a week ago.
> Had rolling reboots lately?  Don't know why?  Lots of "miscellaneous"
> ISP maintenace.  I wonder...
>

Ahhhhhhhhhhhh....

So many routers, so little time...

Ted

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ