Cisco IOS Vulnerability

Petri Helenius pete at he.iki.fi
Fri Jul 18 07:50:53 UTC 2003


> 
> cisco posted what the four 'bad' protocol types were in rev 1.3 of the 
> online doc - now it is just an academic exercise to get them crafted 
> correctly........no imagination necessary, only a router,  a cco 
> login, and a traffic generator needed
> 
With rev 1.0 it took me two hours. IP protocol space is only eight 
bits anyway. 1.3 gives exploit options for less networking oriented
people too.

Pete




More information about the NANOG mailing list