In association with heise online

21 September 2006, 16:26

Three security updates from Cisco

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Cisco has published three security advisories, along with updates, describing vulnerabilities in its products. The most critical vulnerability is in the special versions of the IOS network device operating system, as used in products in the Cisco IAD2400 series, 1900 series mobile wireless edge routers und Cisco VG224 analogue phone gateways. The SNMP community string for read and write access is hard-coded into these versions of IOS. If SNMP is activated, an attacker who knows the character string ("cable-docsis") can gain access to the device to read data or reconfigure the device. Exactly which products are affected is listed in the manufacturer's report.

In addition, Cisco has reported two flaws in its intrusion detection system (IDS) and intrusion prevention system (IPS), through which it is possible to evade the analysis of fragmented packets such that attacks are no longer recognised. In addition, web administration can be crashed using prepared SSLv2 Client Hello packets, such that it is subsequently no longer possible to access it via SSH or the console. Cisco IDS 4.1(x), Cisco IPS 5.0(x) and IPS 5.1(x) are affected. Finally Cisco has also fixed a cross-site scripting vulnerability in Cisco Guard.

See also:

(ehe)

Print Version | Send by email | Permalink: http://h-online.com/-731536
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit