[39270] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco IOS Vulnerability

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Fri Jun 29 23:56:33 2001

Message-ID: <3B3D50C1.D88C5A0A@netmore.net>
Date: Fri, 29 Jun 2001 21:08:33 -0700
From: Roland Dobbins <rdobbins@netmore.net>
Reply-To: rdobbins@netmore.net
MIME-Version: 1.0
To: Larry Diffey <ldiffey@technologyforward.com>
Cc: nanog@merit.edu
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Errors-To: owner-nanog-outgoing@merit.edu


Now, if we could just stop people from posting to email lists
using HTML and/or RTF-formatted mail . . .

Larry Diffey wrote:
> 
> CERT and Cisco have issued a warning about a vulnerability in the
> Cisco IOS starting at version 11.3 and affecting all later versions.
> 
> If your Cisco equipment is HTTP enabled and you're not using TACACS+
> or RADIUS for authentication it is vulnerable to complete takeover.
> The hack is very simple.
> 
> Please read the Cisco warning and/or the CERT advisory for further
> information.
> 
> The warnings were released yesterday.
> 
> Happy Hacker Stopping.
> 
> Larry Diffey
> 

-- 
------------------------------------------------------------
Roland Dobbins <rdobbins@netmore.net> // 408.859.4137 voice

home help back first fref pref prev next nref lref last post