[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <OF94F3E055.3E678EDC-ON86256D65.00781532@fnal.gov>
From: jklemenc at fnal.gov (jklemenc@...l.gov)
Subject: rumours of new Cisco IOS vulnerability
Here is the link to the advisory:
http://www.securiteam.com/securitynews/5PP0E1FAKC.html
|---------+-------------------------------------->
| | Len Rose <len@...sys.com> |
| | Sent by: |
| | full-disclosure-admin@...ts|
| | .netsys.com |
| | |
| | |
| | 07/16/2003 03:36 PM |
| | |
|---------+-------------------------------------->
>------------------------------------------------------------------------------------------------------------------------------|
| |
| To: full-disclosure@...ts.netsys.com |
| cc: |
| Subject: [Full-Disclosure] rumours of new Cisco IOS vulnerability |
>------------------------------------------------------------------------------------------------------------------------------|
They've been discussing the existence of
a new Cisco IOS attack on the NANOG mailing
list (see http://www.merit.edu/mail.archives/nanog/ for
details)
According to what I've been reading it's a remotely
exploitable denial of service situation, based on
specially crafted packets designed to fill up the
"process switched" input queues on an interface.
It seemingly will cause the router to crash or
reboot.
I have no further details.
Len
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists