lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 10 Oct 2007 12:05:23 +0100
From: Damir Rajnovic <gaus@...co.com>
To: bugtraq@...urityfocus.com
Cc: gaus@...co.com
Subject: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques

Hello,

Cisco PSIRT is aware of the three videos IRM Plc. published on their
web site at <http://www.irmplc.com/index.php/153-Embedded-Systems-Security>.
  
Cisco and IRM agree that the videos do not demonstrate or represent a
vulnerability in Cisco IOS.  Specifically, the code to manipulate
Cisco IOS could be inserted only under the following conditions:
                
- Usage of the debugger functionality present in IOS
                            
- Having physical access to the device
                                          
- Already logged in at the highest privilege level on the device.
               
IRM approached Cisco PSIRT with this information prior to its public
release and Cisco has confirmed the information provided is a
proof-of-concept that third party code could be inserted under these
specific conditions.

Regards,

Gaus

==============
Damir Rajnovic <psirt@...co.com>, PSIRT Incident Manager, Cisco Systems
<http://www.cisco.com/go/psirt>      Telephone: +44 7715 546 033
200 Longwater Avenue, Green Park, Reading, Berkshire RG2 6GB, GB
==============
There are no insolvable problems. 
The question is can you accept the solution? 

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ