For more info about "into the fun land of exploiting a routing device made
by Cisco Systems" google with the keywords "Burning the bridge: Cisco IOS
exploits"

Greetz,
marcel


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of [EMAIL PROTECTED]
Sent: Friday, July 29, 2005 11:40 AM
To: swinog@swinog.ch
Subject: RE: [swinog] [Fwd: Cisco IOS Exploit Cover Up]


Hi

Now Cisco has announced the possibility to execute arbitrary code on the
IOS.

(Maybe) the discussions in the net forced Cisco must admit their security
flaw.

http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml

Nice weekend,
marcel

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Fredy Kuenzler
Sent: Wednesday, July 27, 2005 8:41 PM
To: swinog@swinog.ch
Subject: [swinog] [Fwd: Cisco IOS Exploit Cover Up]


Another YAGR to come ... ?!?
F.

-------- Original Message --------
Subject: Cisco IOS Exploit Cover Up
Date: Wed, 27 Jul 2005 13:26:21 -0400
From: James Baldwin <[EMAIL PROTECTED]>
To: nanog@merit.edu


For those who like to keep abreast of security issues, there are interesting
developments happening at BlackHat with regards to Cisco IOS and its
vulnerability to arbitrary code executions.

I apologize for the article itself being brief and lean on technical
details, but allow me to say that it does represent a real problem (as in
practical and confirmed):

http://blogs.washingtonpost.com/securityfix/2005/07/mending_a_hole_.html

_______________________________________________
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog
_______________________________________________
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog
_______________________________________________
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog

Reply via email to