In association with heise online

13 July 2006, 14:21

Weak points in Cisco equipment

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Network equipment manufacturer Cisco has released two security advisories for its products. One of them concerned Cisco's SOHO routers and routers in its 800 series; the other, Cisco's Unified CallManager.

Cisco supplies the routers listed in detail in the security advisory as affected by the first weak point with software called Cisco Router Web Setup (CRWS), which makes the configuration of the equipment easy via the web. In the standard configuration of CRWS versions before 3.3.0 Build 31, however, there was no password query. Attackers could therefore gain access with the highest privileges without logging in.

In Cisco's Unified CallManager, a component in Cisco's telephony solutions, long host names in SIP queries can provoke a buffer overflow, allowing attackers to inject and execute malicious code. The software also continues to have problems with the command line, allowing registered users to expand their rights. Versions 5.0(1) to 5.0(3a) are affected.

Cisco has also released a third advisory on its Intrusion Prevention System (IPS) for appliances in the 4200 series. In IPS software versions 5.1(1) to 5.1(p1), a flaw in the device driver for the Intel-based network cards used can cause these appliances to crash when they process a manipulated packet. Cisco also provides updated software in version 5.2 for this flaw.

Cisco has provided links to patches for these security holes in its security bulletins. In addition, the manufacturer also describes steps that administrators can take to make the equipment more secure.

Also see:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit