Cisco IOS Vulnerability
Petri Helenius
pete at he.iki.fi
Fri Jul 18 07:50:53 UTC 2003
>
> cisco posted what the four 'bad' protocol types were in rev 1.3 of the
> online doc - now it is just an academic exercise to get them crafted
> correctly........no imagination necessary, only a router, a cco
> login, and a traffic generator needed
>
With rev 1.0 it took me two hours. IP protocol space is only eight
bits anyway. 1.3 gives exploit options for less networking oriented
people too.
Pete
More information about the NANOG
mailing list