[104758] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IOS Rookit: the sky isn't falling (yet)

daemon@ATHENA.MIT.EDU (Jared Mauch)
Tue May 27 11:41:31 2008

From: Jared Mauch <jared@puck.nether.net>
To: "Alexander Harrowell" <a.harrowell@gmail.com>
In-Reply-To: <a2b2d0480805270542y418c8ae3r1cd5298ffddd1a50@mail.gmail.com>
Date: Tue, 27 May 2008 11:41:17 -0400
Cc: nanog@merit.edu
Errors-To: nanog-bounces@nanog.org


On May 27, 2008, at 8:42 AM, Alexander Harrowell wrote:

>> An alternative rootkit ? Privilege level 16 used by the Lawful  
>> Intercept
>> [12] feature could be abused to do some of this too. Or the other way
>> around: use a "patched" IOS to keep an eye on Law Enforcement's  
>> >operations
> on the router as privilege level 15 doesn't allow it and the only
>> alternative is to sniff the traffic export.
>
> The combination of rootkits and specially privileged Lawful Intercept
> functions is a very dangerous one. This was precisely what was  
> exploited in
> the now-legendary and still unsolved Vodafone Greece hack.

Perhaps the above should be simplified.

Running a hacked/modded IOS version is a dangerous prospect.

This seems like such a non-event because what is the exploit path to  
load the image? There needs to be a primary exploit to load the  
malware image.

*yawn*

- Jared



home help back first fref pref prev next nref lref last post