> Cisco and IRM agree that the videos do not demonstrate or represent a > vulnerability in Cisco IOS. Specifically, the code to manipulate > Cisco IOS could be inserted only under the following conditions: > > - Usage of the debugger functionality present in IOS > > - Having physical access to the device > > - Already logged in at the highest privilege level on the device. >
will it work if any of the above condition is true or all the above conditions needs to be true? -- --------------------------------------- there is a contest on secgeeks: http://secgeeks.com/announcing_secgeeks_contest.html register here:- http://secgeeks.com/user/register rss feeds :- http://secgeeks.com/node/feed http://www.newskicks.com Submit and kick for new stories from all around the world. --------------------------------------- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/