[71152] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP-ACK vulnerability (was RE: SSH on the router)

daemon@ATHENA.MIT.EDU (Christopher L. Morrow)
Thu Jun 10 01:18:21 2004

Date: Thu, 10 Jun 2004 05:17:28 +0000 (GMT)
From: "Christopher L. Morrow" <christopher.morrow@mci.com>
In-reply-to: <Pine.GSO.4.58.0406091513220.19694@clifden.donelan.com>
To: Sean Donelan <sean@donelan.com>
Cc: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu



On Wed, 9 Jun 2004, Sean Donelan wrote:

>
> http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml
>
> IP Permit Lists will not provide any mitigation against this vulnerability.
>
> The race is on, who will find your switches first?
>

makes one wonder about all that virus-foo running around splashing packets
at 0/0:80... I wonder if any of that might have triggered these reloads
over the last, how long? Since catos was born? :(

a good thing, I think, cisco is finding and releasing these
problems/bugs/'features' in their platforms and thus working through
quality control issues. it's nice, other vendors should do the same for
things that get connected  to the public network.

-Chris

home help back first fref pref prev next nref lref last post