lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070401030540.GA54469@infiltrated.net>
Date: Sat, 31 Mar 2007 22:05:40 -0500
From: "J. Oquendo" <sil@...iltrated.net>
To: full-disclosure@...ts.grok.org.uk
Subject: Cisco IP Phone vulnerability

-----BEGIN LSD SIGNED MESSAGE-----

Infiltrated.net Security Advisory:
Cisco IP Phone Denial of Service
http://www.infiltrated.net/ciscoIPPhone7960.html
Revision 6.9

For Public Release

Summary
The Cisco IP Phones are subject to a denial of
service.

This vulnerability has not yet been documented
by Cisco but it should be allocated the bug ID
31337 by staff @ PSIRT

This advisory will be posted at
http://www.infiltrated.net/ciscoIPPhone7960.html

Affected Products
All Cisco IP Phones

Proof of Concept
http://infiltrated.net/7960poc.jpg

Cisco Security Procedures
Complete information on reporting security
vulnerabilities in Cisco products, obtaining
assistance with security incidents, and
registering to receive security information from
Cisco, is available on Cisco's website at 
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html 
All Cisco security advisories are available at 
http://www.cisco.com/go/psirt.


Details
Cisco IP Phones are subject to a denial of service.
Users who disconnect their ethernet cables will
lose their dial tones and their present call will
drop as well as subsequent incoming calls.

While the attack may be local at present time,
security engineers Infiltrated Networks (a division
of Fscker Inc. with no relation to Halliburton)
are devising telekinetic attacks along with Miss
Cleo in order to provide a working disconnection
attack tool.


Impact
All your phone sex belongs to null 0

Software Versions and Fixes
The only fix is to plug your phone back into a PoE
switch or plug in its power cord.

Obtaining Fixed Software
Infiltrated Networks and Fscker Inc. is offering
its services at the low price of $1000.00 an hour
in consulting fees to remedy this attack, with a
100 hour minimum retainer fee. In fact, for those
seeking to purchase a PoC code of the mentioned
vulnerability, contact us, we'll gladly take your
milk money.

Workarounds
Don't unplug your phone. Don't unplug your PoE
switches. Don't live in areas where electricity
is sporadic. Don't play with matches, and don't
drive while under the influence of anything that
is currently mentioned at http://www.bumwine.com

Exploitation and Public Announcements
Infiltrated.net is not aware of any public
announcements or malicious use of the
vulnerability described in this advisory.

This vulnerability was reported to us
losers, by another bigger loser who wishes
to retain his or her anonyminity out of
fear of obtaining "Michael Lynn Disease"
where a frivolous denial of service attack
via litigation will ensue and weaken the
immune system.

Status of This Notice: FINAL
This is a final Infiltrated.net advisory. Although
we cannot guarantee the accuracy of all statements
in this notice, we still passed it on to you the
consumer knowing full well a cease and desist letter
will be sent and added to our collection. All of the
facts have however been checked to the best of our
ability while not under the influence of Prozac,
Valtrex, Valium, Lithium and lest we forget, weapons
of mass destruction of which you will not find since
we have them buried in the secret stash boxes of our
Nissan, Lexus, WRX, and Cherokee alongside our Glocks.


Revision History
Revision 6.9		Initial public release



This notice is Copyright 2007 by Infiltrated.net.
This notice may be redistributed freely after the
release date given at the top of the text,
provided that redistributed copies are complete
and unmodified, and include all date and version
information. Pictures of your fiance, wife,
girlfriend can be e-mailed to us if said
individuals did not yet e-mail to us on their
own. Infiltrated Networks, sil, and our oddball
affiliates remind those on the security scene to
keep it real. 


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ