| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
X-Apparently-From: <losttoy2000@yahoo.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Message-ID: <027001c0c129$14b7e5b0$1a01010a@sid> Date: Tue, 10 Apr 2001 00:42:53 +0530 Reply-To: Siddhartha Jain <losttoy2000@YAHOO.CO.UK> From: Siddhartha Jain <losttoy2000@YAHOO.CO.UK> To: BUGTRAQ@SECURITYFOCUS.COM Hi, Could this vulnerability exist in other Cisco products using TACACS+ for authentication? For eg. Cisco routers? Siddhartha From: "Claudiu Calomfirescu" <claudiu@DATANETS.RO> > > Description: > ------------ > An attacker from inside or outside interfaces of a > PIX Firewall 515 or 520, 5.1.4 version running aaa > authentication against a TACACS+ Server could > cause the PIX to crash and reload by overwhelming > it with authentication requests. _________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |