[59721] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Working vulnerability? (Cisco exploit)

daemon@ATHENA.MIT.EDU (jlewis@lewis.org)
Fri Jul 18 09:57:38 2003

Date: Fri, 18 Jul 2003 09:57:01 -0400 (EDT)
From: jlewis@lewis.org
To: Ben Buxton <B.Buxton@Planettechnologies.nl>
Cc: Ken Yeo <kenyeo@on-linecorp.com>, <nanog@merit.edu>
In-Reply-To: <7B5898BD5B4D8841B2AFC746EDD683B401571CC9@amfmx01.core.local>
Errors-To: owner-nanog-outgoing@merit.edu


On Fri, 18 Jul 2003, Ben Buxton wrote:

> It's released and it works - I have verified it in a lab here. 

And others are trying it in the field now.  I setup the recommended
transit ACLs yesterday.  Starting at 9:25am EDT this morning, those ACLs
started getting hits.  What doesn't make sense to me is according to the 
advisory, the packets have to be destined for the router to crash it (not 
just passed through it), but people are attacking seemingly random IPs, 
including ones in a new ARIN block that have not yet been assigned/used 
for anything.  What do they think they're attacking?

----------------------------------------------------------------------
 Jon Lewis *jlewis@lewis.org*|  I route
 System Administrator        |  therefore you are
 Atlantic Net                |  
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________


home help back first fref pref prev next nref lref last post