lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <09f501c34beb$fa04eb50$8405a8c0@bogus.net>
From: codex at bogus.net (Codex)
Subject: rumours of new Cisco IOS vulnerability

i believe this is not the advisory you're looking for.

----- Original Message ----- 
From: <jklemenc@...l.gov>
To: "Len Rose" <len@...sys.com>
Cc: <full-disclosure@...ts.netsys.com>
Sent: Wednesday, July 16, 2003 10:53 PM
Subject: Re: [Full-Disclosure] rumours of new Cisco IOS vulnerability


>
> Here is the link to the advisory:
> http://www.securiteam.com/securitynews/5PP0E1FAKC.html
>
>
>
> |---------+-------------------------------------->
> |         |           Len Rose <len@...sys.com>  |
> |         |           Sent by:                   |
> |         |           full-disclosure-admin@...ts|
> |         |           .netsys.com                |
> |         |                                      |
> |         |                                      |
> |         |           07/16/2003 03:36 PM        |
> |         |                                      |
> |---------+-------------------------------------->
>
>---------------------------------------------------------------------------
---------------------------------------------------|
>   |
|
>   |       To:       full-disclosure@...ts.netsys.com
|
>   |       cc:
|
>   |       Subject:  [Full-Disclosure] rumours of new Cisco IOS
vulnerability                                                     |
>
>---------------------------------------------------------------------------
---------------------------------------------------|
>
>
>
>
>
> They've been discussing the existence of
> a new Cisco IOS attack on the NANOG mailing
> list (see http://www.merit.edu/mail.archives/nanog/ for
> details)
>
> According to what I've been reading it's a remotely
> exploitable denial of service situation, based on
> specially crafted packets designed to fill up the
> "process switched" input queues on an interface.
>
> It seemingly will cause the router to crash or
> reboot.
>
> I have no further details.
>
> Len
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
>
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ