lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1058401385.15885.13.camel@frodo>
From: robert at infoserf.net (Rob Lemos)
Subject: rumours of new Cisco IOS vulnerability

I have been told that the July 9 issue is not the flaw in question.

Here is as much detail as I have confirmed at this point:

http://news.com.com/2100-1035_3-1026518.html?tag=fd_top

-R

On Wed, 2003-07-16 at 13:14, christopher neitzert wrote:
> Details about the vulnerability here:
> http://www.cisco.com/warp/public/707/cisco-sa-20030709-swtcp.shtml
> 
> 
> Summary
> After receiving eight TCP connection attempts using a non-standard TCP
> flags combination, a Catalyst switch will stop responding to further TCP
> connections to that particular service. In order to re-establish
> functionality of that service, the switch must be rebooted. There is no
> workaround. This vulnerability affects only CatOS. No other Cisco
> products are affected.

-- 
| robert lemos | computer & tech journalist |
| v: 510/481-8166 | e: robert@...oserf.net  |


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ