lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030716175649.452c5dc1.nigel.houghton@sourcefire.com>
From: nigel.houghton at sourcefire.com (Nigel Houghton)
Subject: rumours of new Cisco IOS vulnerability

Are you talking about this...

 http://www.securityfocus.com/bid/8149

or something new?

On Wed, 16 Jul 2003 16:36:17 -0400
Len Rose <len@...sys.com> said something like:

: 
: They've been discussing the existence of
: a new Cisco IOS attack on the NANOG mailing
: list (see http://www.merit.edu/mail.archives/nanog/ for
: details)
: 
: According to what I've been reading it's a remotely
: exploitable denial of service situation, based on
: specially crafted packets designed to fill up the
: "process switched" input queues on an interface.
: 
: It seemingly will cause the router to crash or
: reboot.
: 
: I have no further details.
: 
: Len
: 
: _______________________________________________
: Full-Disclosure - We believe in it.
: Charter: http://lists.netsys.com/full-disclosure-charter.html


-------------------------------------------------------------
Nigel Houghton       Security Engineer        Sourcefire Inc.

"I have read of a place where humans do battle in a ring of Jell-O."

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ