[82714] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco cover up

daemon@ATHENA.MIT.EDU (Stephen J. Wilcox)
Thu Jul 28 11:15:21 2005

Date: Thu, 28 Jul 2005 15:43:46 +0100 (BST)
From: "Stephen J. Wilcox" <steve@telecomplete.co.uk>
To: James Baldwin <jbaldwin@antinode.net>
Cc: "J. Oquendo" <sil@politrix.org>, <nanog@nanog.org>
In-Reply-To: <81BCAB3F-9406-4E63-956C-65DDEFD7EA9A@antinode.net>
Errors-To: owner-nanog@merit.edu


On Wed, 27 Jul 2005, James Baldwin wrote:

> Cisco had initially approved this talk. My understanding is that this has been
> fixed and no current IOS images were vulnerable to the techniques he was
> describing. ISS, Lynn, and Cisco had been working together for months on this
> issue before the talk.

Just because they fixed the bugs doesnt mean there arent a large number of 
publically accessible routers out there still running affected versions..

I suspect there was something slightly more than just giving information about
the vulnerabilities.. the inference is that they demonstrated executing
arbitrary code from buffer overflows.. perhaps for example they developed ways
of opening up privilege vty which I dont think has been shown before

Steve


home help back first fref pref prev next nref lref last post