nanog mailing list archives
Re: Cisco IOS Vulnerability
From: Jack Bates <jbates () brightok net>
Date: Thu, 17 Jul 2003 13:49:46 -0500
Sean Donelan wrote:
Cisco stated if they receive any reports of the exploit in the wild, they will re-issue the advisory with the updated information.
Sendmail root exploit took less than 24 hours to craft. I suspect that this exploit will be found within 48 hours. Enough information was provided to quickly guess where the problem lies with IPv4 processing.
-Jack
Current thread:
- Re: Cisco IOS Vulnerability, (continued)
- Re: Cisco IOS Vulnerability Christopher L. Morrow (Jul 16)
- Re: Cisco IOS Vulnerability Jason Lixfeld (Jul 16)
- RE: Cisco IOS Vulnerability Todd Mitchell - lists (Jul 16)
- Re: Cisco IOS Vulnerability Ryan Tucker (Jul 16)
- Re: Cisco IOS Vulnerability (going OT) Petri Helenius (Jul 16)
- Flapping (was Re: Cisco IOS Vulnerability) Sean Donelan (Jul 16)
- RE: Cisco IOS Vulnerability Mikael Abrahamsson (Jul 16)
- Re: Cisco IOS Vulnerability Jared Mauch (Jul 16)
- RE: Cisco IOS Vulnerability Sean Donelan (Jul 16)
- Re: Cisco IOS Vulnerability Jeff Kell (Jul 16)
- Re: Cisco IOS Vulnerability Jack Bates (Jul 17)
- Re: Cisco IOS Vulnerability Andy Dills (Jul 17)
- Re: Cisco IOS Vulnerability Joe Abley (Jul 17)
- Re: Cisco IOS Vulnerability micah mcnelly (Jul 17)
- Re: Cisco IOS Vulnerability Michael Painter (Jul 17)
- Re: Cisco IOS Vulnerability Daniel Karrenberg (Jul 18)
- Re: Cisco IOS Vulnerability joshua sahala (Jul 18)
- Re: Cisco IOS Vulnerability Petri Helenius (Jul 18)
- RE: Cisco IOS Vulnerability Darrell Kristof (Jul 16)
- Re: Cisco IOS Vulnerability Valdis . Kletnieks (Jul 17)
- Re: Cisco IOS Vulnerability Brian Wallingford (Jul 17)