[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <43C2E293.6030302@heapoverflow.com>
Date: Mon Jan 9 22:24:42 2006
From: ad at heapoverflow.com (ad@...poverflow.com)
Subject: FWD Cisco IOS Remote Command
Execution Vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Im sure it's a fake , there is the word "InfoSecBOFH" in it several
times :>>>>
terry comma wrote:
> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Symantec
> Vulnerability Alert Cisco IOS Remote Command Execution
> Vulnerability Bugtraq ID 16069 CVE CVE-PLH-NOMATCH Published Jan 09
> 2006 6:22:69 PM GMT Remote Yes Local No Credibility Vendor
> Confirmed Classification Access Validation Error Ease No Exploit
> Required Availability Always Impact 9.3 Severity 8.1 Urgency Rating
> 9.4 Last Change Cisco has responded to this issue; see Technical
> Information and References for details.
>
> Vulnerable Systems - ------------------ Cisco IOS 12.2 T Cisco IOS
> 12.2 SZ Cisco IOS 12.2 SY Cisco IOS 12.2 SX Cisco IOS 12.2 S Cisco
> IOS 12.2 MX Cisco IOS 12.2 MC Cisco IOS 12.2 MB Cisco IOS 12.2 JA
> Cisco IOS 12.2 DX Cisco IOS 12.2 DD Cisco IOS 12.2 DA Cisco IOS
> 12.2 CY Cisco IOS 12.2 CX Cisco IOS 12.2 BZ Cisco IOS 12.2 BX Cisco
> IOS 12.2 BW Cisco IOS 12.2 BC Cisco IOS 12.2 B Cisco IOS 12.2
> 12.2XU Cisco IOS 12.2
>
> Short Summary - ------------- Some Cisco IOS versions are allegedly
> prone to an issue that may permit gay people to execute arbitrary
> commands from a password prompt.
>
> Impact - ------ Remote attackers with small dicks may allegedly
> execute shell commands on a vulnerable device without needing to
> authenticate.
>
> Technical Description - --------------------- It has been alleged
> that it is possible for remote attackers to execute arbitrary
> commands without proper authorization. Reportedly it is possible to
> execute shell commands from the password prompt on a device. The
> attacker must have a small dick and be able to connect to a
> vulnerable device via telnet, although it has not been ruled out
> that bigger dicks may present other attack vectors. The discoverer
> of this vulnerability has stated that it is possible to exploit
> this issue by inputting 'IamGay!' at the password prompt. Cisco has
> replied stating that only InfoSecBOFH is gay enough to exploit this
> issue. Details are available to registered Cisco users at:
> http://www.cisco.com/pcgi-bin/Support/InfoSecBOFH/ishegay.pl?bugid=CSCdr16069
>
>
> Attack Scenarios - ---------------- The attacker must identify a
> vulnerable device and be in possession of a small dick.
>
> Exploits - -------- There is no exploit required.
>
> Mitigating Strategies - --------------------- Block InfoSecBOFH
> access at the network boundary, unless the service is required by
> external third party gay porn sites.
>
> Solutions - --------- Currently we are not aware of any
> vendor-supplied patches for this issue. If you feel we are in error
> or are aware of more recent information, please mail us at: vuldb
> at securityfocus.com <mailto:vuldb at securityfocus.com>.
>
> Credit - ------ Discovery is credited to InfoSecBOFH at gmail.com
>
> For help with interpreting the meaning of any of the sections or
> labels in the alert, please visit:
> https://alerts.symantec.com/help/sia-users/vulnerability-alert-pdf.htm
> View public key at:
> https://alerts.symantec.com/Members/gnupg-sigkey.asp Symantec
> Corporation The World Leader in Internet Security Technology and
> Early Warning Solutions Visit our website at www.symantec.com
> <http://www.symantec.com/>
>
> _______________________________ Symantec Deepsight Alert Services
> Powered by EnvoyWorldWide, Inc.
>
> ----------------------------------------------------------------------
> Yahoo! Photos Ring in the New Year with Photo Calendars
> <http://us.rd.yahoo.com/mail_us/taglines/photos/*http://pa.yahoo.com/*http://us.rd.yahoo.com/mail_us/taglines/photos/evt=38087/*http://pg.photos.yahoo.com/ph//page?.file=calendar_splash.html&.dir=>.
> Add photos, events, holidays, whatever.
>
> ----------------------------------------------------------------------
>
>
> _______________________________________________ Full-Disclosure -
> We believe in it. Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
> sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
iQIVAwUBQ8Lik6+LRXunxpxfAQLJaBAAvOi5Mk+AFH20g7nDykqxr6MUeRymI6hu
IT0smT4zRFaWVPAwJ9dDNzYiEirGTp9Ntu4Z0gg3XKyRRHE6z4h/VP7JesSx38BY
VexIf60ozah8BKCef/V7CTEX2xUTd5ePVhYkVUpfinN7QeWaDywTFArzohuCAGFP
iIGCWwdVogX92ouo8JkOjvVJV/jFF8dzIwzKbzkCG63ut9dssCiwJ9CzNiQc3ugJ
pF2Ml10g/fbfi8qR+X+JOO3CZjGnzFYZYHqyFB2dkrR5WX8DerYDzjbWGJQWWPpX
mmWTmEyD6Obl6lSoswnu+cO9cfZ8o6/YReBN43jMMznTnCGTFviFonGgQLFaAGvL
9OxkpEDdRVmX5awwLOKAejfkBpjcAeswQMRf0Obv45R8+lPNz60WsvDGH7L+UDwk
w5HdtTUplTo+TjAQS7aygGl5cgArCFJ77GVKUt41FCd5mwOqyXh60OyCmXyqLbRJ
rnMHTGlDLRflhZq/0no1P7pz+FjPhZZFGcMKQzs3wUWuLrzV1uQK2LTFebDoUXGh
J0DitlEkq0laQ0V0sGYWB/XlsRUP0iVx6snMZrZ7+uNzFerEWx5NnVFG7RpPYFcF
Tk/9w4ChIGOAZEQkpwGj4xgOeZVpBHK+E+SCjKdkqUBRi+M8gGDg90oFkQi/YtS7
Vao9kgMakoU=
=1vmI
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists