Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: InfoSec Handlers Diary Blog - Three Cisco advisories released today InfoSec Handlers Diary Blog

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Three Cisco advisories released today

Published: 2008-05-21
Last Updated: 2008-05-22 13:03:31 UTC
by George Bakos (Version: 1)
0 comment(s)

Cisco has released three advisories this week, two that cover DOS vulnerabilities in IOS SSH and the Secure Control Engine (SCE) and one privilege escalation in Cisco Voice Portal (CVP).

While the "Exploitation and Public Announcements" portion of all three advisories states that the vulns were discovered in-house, it's a pretty safe bet that a fair number of security "researchers" are feverishly reverse engineering the updates to develop exploits for private use and/or public release.

Anytime we see a "spurious memory access" leading to a denial of service, thoughts immediately go to arbitrary code execution.  There is no evidence that this is possible, but in light of the recent work in IOS rootkits, vulns in Cisco devices should not be taken lightly.  Sebastian Muniz of CORE Security is scheduled to release a proof of concept Cisco IOS rootkit tomorrow at EuSecWest.  Stand by for more details.

Read 'em and update:

Cisco IOS Secure Shell Denial of Service Vulnerabilities

Cisco Service Control Engine Denial of Service Vulnerabilities

Cisco Voice Portal Privilege Escalation Vulnerability


0 comment(s)
Diary Archives