This may be a little off topic, but does anyone know where I can find technical details and solutions for Michael Lynne's IOS vulnerability?    I am concerned that my systems aren't patched and evern since Ciscogate, K-otik, Secunia, Security-Focus have all removed their original vulnerability advisories.



On 9/19/05, Kirill Bolshakov <[EMAIL PROTECTED]> wrote:
No, this is not true. Just some old hacks for "old stolen xxx sources".
No POCs, nothing. Just some flame to support the book, which that guy is
a co-author of. Seek a Russian-speaking neighbor ;) the automatic
translation is inferior.

Regards,
Kirill

ciscoioshehehe wrote:
> today news on SecurityLab.ru (only in russian):
>
> http://www.securitylab.ru/news/240415.php
>
> * break CRC on CISCO IOS
> * Desgin Mechanism of cross-platform worm for IOS device.
> *  Run IRC server on 2600 CISCO.
> * Found more vulnerabilities in EIGRP protocol.
>
> and some more...
>
> Online translate from Russian:
>
> http://www.translate.ru/url/tran_url.asp?lang=ru&url=""
>
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to