Already
upgraded!
If any of
you noticed the Internet flapping over the past weekend, that's probably because
most of the major carriers were rebooting. The work around is basically an ACL
to block packets with protocol type 53, 55, 77 and 103. This could have a
performance impact on your routers.
The best fix
would be not to run buggy software, and upgrade to the patched IOS train. Just
FYI, Cisco will discontinue maintenance on the 12.2T train, so for those of your
using the T IOS, your best bet is to upgrade to the 12.3(1a), which is a
continuation of the T [Technology] train. However, the current 12.2T is a
rebuild of vulnerable one, so installing it would patch your
hole.
Sorry for
the OT :-).
Regards,
Mark Tinka - CCNA
Network Engineer, Africa Online Uganda
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kiggundu Mukasa
Sent: Monday, July 21, 2003 9:59 AM
To: LUG
Subject: lug_: CERT: Exploit Available for Cisco IOS Vulnerability
Attention all ISPs. Just in case you missed it
http://www.cert.org/advisories/CA-2003-17.html
Systems Affected
All Cisco devices running Cisco IOS software and configured to process Internet Protocol version 4 (IPv4) packets
An exploit has been posted publicly for VU#411332. This exploit allows an attacker to interrupt the normal operation of a vulnerable device. We believe it is likely that intruders will begin using this or other exploits to cause service outages.
-- **************** ***************************** Kiggundu Mukasa # Computer Network Consultancy### KYM-NET LTD. # Intranets & Internet Solutions# House 73 # Data Communication Service #### Plot 80 kanjokya Street P.O. Box 173 Kampala, Uganda Tel: +256 77 972255 +256 71 221141 Fax: +256 31 262122 *************************************************************************
