On Tue, Apr 10, 2001 at 11:49:28AM -0400, stanislav shalunov wrote:
> Chiaki Ishikawa <[EMAIL PROTECTED]> writes:
>
> > Has anyone tested the exploit against embedded ntp implementations
> > such as in Cisco router, for example, to see if the daemon would
> > misbehave, etc.?
>
> I couldn't do anything to the NTP implementation of a Cisco router
> here with the stock "ntpdx" exploit as it was posted.  (It doesn't
> crash, it doesn't exhibit same heap corruption as xntpd v3.)
>

Cisco IOS (at least 11.x series) _IS_ vulnerable (tested, confirmed). Earlier
versions are presumably vulnerable too. Haven't tested IOS 12.x but it may have
the same bug inherited as well (unless cisco folks found the problem and fixed
it silently).

Hope it helps...


-Fyodor
--
http://www.notlsd.net
PGP fingerprint = 56DD 1511 DDDA 56D7 99C7  B288 5CE5 A713 0969 A4D1

Reply via email to