[59689] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco IOS Vulnerability

daemon@ATHENA.MIT.EDU (Joe Abley)
Thu Jul 17 16:11:57 2003

Date: Thu, 17 Jul 2003 16:11:21 -0400
Cc: Jack Bates <jbates@brightok.net>,
	Sean Donelan <sean@donelan.com>,
	Mikael Abrahamsson <swmike@swm.pp.se>, <nanog@merit.edu>
To: Andy Dills <andy@xecu.net>
From: Joe Abley <jabley@isc.org>
In-Reply-To: <Pine.BSF.4.44.0307171558130.35444-100000@thunder.xecu.net>
Errors-To: owner-nanog-outgoing@merit.edu



On Thursday, Jul 17, 2003, at 15:59 Canada/Eastern, Andy Dills wrote:

> On Thu, 17 Jul 2003, Jack Bates wrote:
>
>> Sendmail root exploit took less than 24 hours to craft. I suspect that
>> this exploit will be found within 48 hours. Enough information was
>> provided to quickly guess where the problem lies with IPv4 processing.
>
> Sendmail is open source, IOS is not.
>
> Knowing where the problem is and knowing how to exploit it are two
> entirely different situations.

If any IOS source code has ever found its way out of cisco since IOS 
10.3 (and surely, that must have happened), then it seems reasonable to 
assume that there are people in the world currently comparing the 
advisory to the source.


Joe


home help back first fref pref prev next nref lref last post