[ale] OT: Cisco IPv4 DoS vuln (High)

Raju mr at 4securenet.com
Fri Jul 18 20:28:14 EDT 2003


http://packetstorm.linuxsecurity.com/0307-exploits/shadowchode.tar.gz

So far I have only seen PIM being targeted. The new workaround is to add
ACLs to drop 53, 55, 77 and PIM 103.

int protocols[ ] = { 53, 55, 77, 103 };

Yeah, TAC has one of the best customer service I have known. Surprising
how Cisco maintains the level of service for a giant in the Internet (in
contrast to many large companies) :-)

--Raju



> On Friday 18 July 2003 17:33, Raju wrote:
>> Just in case anyone is not aware of this and is running Cisco gear. I
>> think there is exploit code already floating around. I would not be
>> surprised if a new worm originates soon :-)
>
> Exploit code is out there. The patch is pretty simple to apply and the
> TAC  is being very helpful on this one if you have a contract.
>
> --
> Jonathan Rickman
> X Corps Security
> http://www.xcorps.net
>
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale





_______________________________________________
Ale mailing list
Ale at ale.org
http://www.ale.org/mailman/listinfo/ale





More information about the Ale mailing list