Vulnerability Development mailing list archives

Re: Cisco 678 exploit


From: Damir Rajnovic <gaus () CISCO COM>
Date: Thu, 12 Oct 2000 07:15:44 +0100

Hello George,

At 21:55 11/10/2000 -0400, George wrote:
Is there anyone on this list who could help me track this down further? It
seems to me that if this is in fact affecting the router and not machine2
that this would be a very simple way for one person inside a company to
knock out the internet connection so I think it could classify as an
exploit.

We are on the list and we can help you. Even more, we can fix
that for you, if it proves to be a problem.

As usual, we like when people reports such things so that we can
fix them. The best of all we like when people send a mail to us
first so that we do not have to rush things (yada, yada, yada -
insert standard vendor's complains here).

Cheers,

Gaus
==============
Damir Rajnovic <psirt () cisco com>, PSIRT Incident Manager, Cisco Systems
<http://www.cisco.com/warp/public/707/sec_incident_response.shtml>
Phone: +44 7715 546 033
4 The Square, Stockley Park, Uxbridge, MIDDLESEX UB11 1BN, GB
==============
There is no insolvable problems. Question remains: can you
accept the solution?


Current thread: