Sounds possibly like an attack versus CSCsf12082. CVE is CVE-2008-0537
http://www.cisco.com/warp/public/707/cisco-sa-20080326-queue.shtml
--
robbie
Eric Van Tol
<[EMAIL PROTECTED]
et> To
Sent by: "[email protected]"
cisco-nsp-bounces <[email protected]>
@puck.nether.net cc
Subject
07/03/2008 06:45 [c-nsp] OSPF4-BAD-LENGTH
AM
Hi all,
This isn't a question of what, but how :-) We received this log on one of
our 6509s last night:
Jul 3 06:04:40 EDT: %OSPF-4-BADLENGTH: Invalid length 34778 in OSPF packet
type 39 from 218.106.119.133 (ID 244.193.1.14), GigabitEthernet1/5
This address has no direct connectivity with our network, as it appears to
be from a Chinese network. My question is how does an OSPF packet get
through the general internet? Or could this be more than likely just some
sort of vulnerability scanner that is spoofing various protocols?
-evt
_______________________________________________
cisco-nsp mailing list [email protected]
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/
_______________________________________________
cisco-nsp mailing list [email protected]
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/