on that topic, the following has been circulating regaring Cisco
vulnerabilities.

I think the real worry is not that some joker is going to attmept to bring
down a couple of routers with a half assed exploit. The very real concern is
that some more sinister group or organization might try to destroy data
communications with a well thought out well planned attack.

as I said previously, nobody should be getting smug or looking down their
noses at Microsoft or any other OS. All OS's are vulnerable.

> Subject: THREE VULNERABILITIES THREATEN CISCO SOFTWARE
>
> FYI
>
> *THREE VULNERABILITIES THREATEN CISCO SOFTWARE
> Attackers can leverage a trio of unrelated problems to cause data
> compromise, reboot, a denial of service, or execution of arbitrary code in
> three separate pieces of Cisco Systems software.
>
> The first vulnerability affects the CS800 chassis system controller module
> (SCM). Since the SCM waits for responses to its pings, an external flood
> of SYN packets to the SCM's circuit address can fool the SCM into
> rebooting the CS800, causing a denial of service. Such an attack is
> possible with only a few TCP sessions over a fast Internet connection.
> Cisco recommends users of models 11050, 11150 and 11800 upgrade to WebNS
> 5.00.110s. Using access control lists to limit the traffic to the SCM's
> circuit address is an effective mitigation.
>
> The second vulnerability is in the udp-small-servers service on Cisco
> devices running IOS 12.0 (3.2) and earlier is the source of another
> vulnerability. An attacker sending malformed UDP packets receives replies
> that contain portions of the data in router memory, which could include
> confidential information. Alternatively, users can disable
> udp-small-servers--the default since release 11.2(1). A fix is also
> available.
>
> A third vulnerability in releases up to 12.3 and 12.3T requires a great
> deal of effort to exploit: a malformed GET request with more than 2 GB of
> data directed to the IOS HTTP server can cause a buffer overflow and could
> lead to the execution of arbitrary code. A workaround uses ACLs to limit
> which hosts can access the http server. Software fixes and workarounds are
> available from Cisco.
> http://www.cisco.com/warp/public/707/cisco-sn-20030731-ios-udp-echo.shtml
>  >
>
>



""Reimer, Fred""  wrote in message
news:[EMAIL PROTECTED]
> I agree with you.  Again, without naming names, I know several customers
> that have not upgraded their IOS software to patch the IPv4 vulnerability,
> and some don't even have a plan or schedule to do so!  We upgraded to
> appropriate code quite quickly after we were aware of the problem.
>
> Imagine if the recent worm had a timer set not to attack Microsoft's site,
> but instead to attack Cisco routers with that vulnerability.  Use a
> Microsoft bug to DDoS on Cisco gear!  That would have been catastrophic.
>
> Fred Reimer - CCNA
>
>
> Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
> Phone: 404-847-5177  Cell: 770-490-3071  Pager: 888-260-2050
>
>
> NOTICE; This email contains confidential or proprietary information which
> may be legally privileged. It is intended only for the named recipient(s).
> If an addressing or transmission error has misdirected the email, please
> notify the author by replying to this message. If you are not the named
> recipient, you are not authorized to use, disclose, distribute, copy,
print
> or rely on this email, and should immediately delete it from your
computer.
>
>
> -----Original Message-----
> From: "Chuck Whose Road is Ever Shorter" [mailto:[EMAIL PROTECTED]
> Sent: Saturday, August 16, 2003 11:26 PM
> To: [EMAIL PROTECTED]
> Subject: Re: OT Microsoft worm [7:74045]
>
> ""Reimer, Fred""  wrote in message
> news:[EMAIL PROTECTED]
> > For reasons of confidentiality I won't and can't name any names, but I
am
> > aware of several hospitals that were affected pretty seriously.
Everyone
> > here knows that Cisco Call Manager runs on Windows, so imagine what
> happens
> > to your entire phone infrastructure if you are running VoIP.  Network
> grinds
> > to a halt and admitting can't access the applications to admit people in
> the
> > ER.  Lab orders don't go through, so meds can't be dispersed based on
the
> > results of tests.  Everything goes back to a paper fall-back scheme
until
> > the Windows administrators patch the systems like they should have done
> > weeks ago.
> >
> > So no, don't assume that even large organizations have a handle on
things.
> > Especially hospitals which are notoriously on the low end as far as
> > adequately staffing, at the right levels, their IT staff.
> >
> > One thing I sincerely hope is changed in our lexicon is calling Windows
> > administrators "network administrators."  It makes me physically ill,
> > because those folks don't "administer" the "network," if anything they
> > actually do can be classified as competent administration.  They should
be
> > called what they are "systems administrators," or, if you want to be
more
> > specific, "Windows administrators."  I personally think they deserve a
> > classification of their own.
> >
> > All I can say is that the Windows systems that our group has to use and
is
> > responsible for were patched long ago, and did not exhibit any issues.
>
>
> in fairness to all, Cisco is starting to be hit with attacks geared
> specifically towards Cisco routers and Cisco IOS. Seems to me I saw a
couple
> of serious attacks announced the other day.
>
> We can chuckle and snicker and point fingers at Microsoft, but all vendors
> are vulnerable. When the hacker community wants to turn its attention to
> Linux, or Solaris, or MacOS, those systems will take it in the shorts too.
>
>
>
> >
> > Fred Reimer - CCNA
> >
> >
> > Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
> > Phone: 404-847-5177  Cell: 770-490-3071  Pager: 888-260-2050
> >
> >
> > NOTICE; This email contains confidential or proprietary information
which
> > may be legally privileged. It is intended only for the named
recipient(s).
> > If an addressing or transmission error has misdirected the email, please
> > notify the author by replying to this message. If you are not the named
> > recipient, you are not authorized to use, disclose, distribute, copy,
> print
> > or rely on this email, and should immediately delete it from your
> computer.
> >
> >
> > -----Original Message-----
> > From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
> > Sent: Saturday, August 16, 2003 1:22 PM
> > To: [EMAIL PROTECTED]
> > Subject: OT Microsoft worm [7:74045]
> >
> > Just wondering, is this new LOVSAN msblast worm as big as it seems to
be?
> > I've been helping lots of Windows users clean up their machines. They
all
> > had the worm. These are mostly home users. I can't believe they would
use
> > broadband, "always-on" access and not have a firewall, but they didn't!
> >
> > What are you all seeing? Is this a big one? I suppose enterprise
networks
> > are much better protected (hopefully) than the home networks I've been
> > helping out with.
> >
> > One has to wonder if the huge power outage could be related. I can
imagine
> a
> > Windows computer somewhere in Ohio that played a surprisingly important
> role
> > in keeping the grid working and had been infected..... But I read a lot
of
> > science fiction. :-)
> >
> > By the way, the stupid worm is attacking the wrong Microsoft URL! So
that
> > aspect of it isn't going to be as bad as once thought.
> >
> > Comments?
> >
> > Priscilla
> > **Please support GroupStudy by purchasing from the GroupStudy Store:
> > http://shop.groupstudy.com
> > FAQ, list archives, and subscription info:
> > http://www.groupstudy.com/list/cisco.html
> > **Please support GroupStudy by purchasing from the GroupStudy Store:
> > http://shop.groupstudy.com
> > FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> **Please support GroupStudy by purchasing from the GroupStudy Store:
> http://shop.groupstudy.com
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> **Please support GroupStudy by purchasing from the GroupStudy Store:
> http://shop.groupstudy.com
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74134&t=74045
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to