Vulnerabilities in Cisco products
Cisco has reported the discovery of a vulnerability in the IOS line printer daemon (LPD). Attackers may be able to exploit the flaw to cause a system to crash or to compromise it. A buffer overflow occurs in the handling of excess length host names. However, for the attack to succeed, the attacker has to be able to manipulate the hostname. The LPD is disabled by default. An IOS update has been released to remedy the problem.
Another problem occurs during the conversion of the CiscoWorks Wireless LAN Solution Engine (WLSE) into a Cisco Wireless Control System (WCS). The report says that the conversion tool creates administrator accounts with default credentials. Attackers could thereby get complete control of the system. Only WCS systems converted from a WLSE system using the Convert Utility up to and including version 220.127.116.11 are affected. Cisco recommends that administrators set secure passwords for all accounts.
- Cisco IOS Line Printer Daemon (LPD) Protocol Stack Overflow, security advisory from Cisco
- http://www.irmplc.com/index.php/155-Advisory-024, security advisory from IRM
- Cisco Wireless Control System Conversion Utility Adds Default Password, security advisory from Cisco