[17378] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Cisco Security Advisory: Cisco IOS HTTP Server Query

daemon@ATHENA.MIT.EDU (Lisa Napier)
Thu Oct 26 21:16:36 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Message-Id:  <4.3.2.7.2.20001026153819.06b4a620@twoguys>
Date:         Thu, 26 Oct 2000 15:39:39 -0700
Reply-To: Lisa Napier <lnapier@CISCO.COM>
From: Lisa Napier <lnapier@CISCO.COM>
X-To:         courcoul@campus.qro.itesm.mx
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <39F8A610.60B5DD7A@campus.qro.itesm.mx>

At 04:45 PM 10/26/2000 -0500, Juan M. Courcoul wrote:
>"Cisco Systems Product Security Incident Response Team" wrote:
> >
> >                    Cisco IOS HTTP Server Query Vulnerability
> >
> > Revision 1.0
> >
> >   For public release 2000 October 25 at 08:00 US/Pacific (UTC+0700)
> >      _________________________________________________________________
> >
> > Summary
> >
> >    A defect in multiple releases of Cisco IOS software will cause a Cisco
> >    router or switch to halt and reload if the IOS HTTP service is
> >    enabled, browsing to "http://router-ip/anytext?/" is attempted, and
> >    the enable password is supplied when requested. This defect can be
> >    exploited to produce a denial of service (DoS) attack.
> >
>....snip....
> >
> >      * Catalyst 1900, 2800, 2900, 3000, and 5000 series LAN switches are
> >        not affected, except for some versions of the Catalyst 2900XL.
> >        However, optional router modules running Cisco IOS software in
> >        switch backplanes, such as the RSM module for the Catalyst 5000
> >        and 5500, are affected (see the Affected Products section above).
>
>Minor, field-tested, correction:
>
>A networking specialist working at one of our campuses has determined that
>Catalyst 2820 units with ATM interfaces are also vulnerable to this exploit,
>although the advisory implies that they are not.
>
>J. Courcoul
>ITESM

Thank you.

We are updating the advisory later today with updated version availability,
and correcting this error.

Thanks much,

Lisa Napier
Product Security Incident Response Team
Cisco Systems

home help back first fref pref prev next nref lref last post