[ale] OT: Cisco IPv4 DoS vuln (High)
Raju
mr at 4securenet.com
Fri Jul 18 20:28:14 EDT 2003
http://packetstorm.linuxsecurity.com/0307-exploits/shadowchode.tar.gz
So far I have only seen PIM being targeted. The new workaround is to add
ACLs to drop 53, 55, 77 and PIM 103.
int protocols[ ] = { 53, 55, 77, 103 };
Yeah, TAC has one of the best customer service I have known. Surprising
how Cisco maintains the level of service for a giant in the Internet (in
contrast to many large companies) :-)
--Raju
> On Friday 18 July 2003 17:33, Raju wrote:
>> Just in case anyone is not aware of this and is running Cisco gear. I
>> think there is exploit code already floating around. I would not be
>> surprised if a new worm originates soon :-)
>
> Exploit code is out there. The patch is pretty simple to apply and the
> TAC is being very helpful on this one if you have a contract.
>
> --
> Jonathan Rickman
> X Corps Security
> http://www.xcorps.net
>
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale
_______________________________________________
Ale mailing list
Ale at ale.org
http://www.ale.org/mailman/listinfo/ale
More information about the Ale
mailing list