Title: Message
Already upgraded!
 
If any of you noticed the Internet flapping over the past weekend, that's probably because most of the major carriers were rebooting. The work around is basically an ACL to block packets with protocol type 53, 55, 77 and 103. This could have a performance impact on your routers.
 
The best fix would be not to run buggy software, and upgrade to the patched IOS train. Just FYI, Cisco will discontinue maintenance on the 12.2T train, so for those of your using the T IOS, your best bet is to upgrade to the 12.3(1a), which is a continuation of the T [Technology] train. However, the current 12.2T is a rebuild of vulnerable one, so installing it would patch your hole.
 
Sorry for the OT :-).
 
Regards,

Mark Tinka - CCNA
Network Engineer, Africa Online Uganda

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kiggundu Mukasa
Sent: Monday, July 21, 2003 9:59 AM
To: LUG
Subject: lug_: CERT: Exploit Available for Cisco IOS Vulnerability


Attention all ISPs.  Just in case you missed it

http://www.cert.org/advisories/CA-2003-17.html

Systems Affected
All Cisco devices running Cisco IOS software and configured to process Internet Protocol version 4 (IPv4) packets

An exploit has been posted publicly for VU#411332. This exploit allows an attacker to interrupt the normal operation of a vulnerable device. We believe it is likely that intruders will begin using this or other exploits to cause service outages.

-- 
****************                          *****************************
Kiggundu Mukasa                          # Computer Network Consultancy###
KYM-NET LTD.                             # Intranets & Internet Solutions#
House 73              	                 # Data Communication Service ####
Plot 80 kanjokya Street
P.O. Box 173 Kampala, Uganda             
Tel:     +256 77 972255
         +256 71 221141
Fax:     +256 31 262122
*************************************************************************

Reply via email to