Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Three Cisco advisories released today SANS ISC InfoSec Forums

Participate: Learn more about our honeypot network
https://isc.sans.edu/honeypot.html

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Three Cisco advisories released today

Cisco has released three advisories this week, two that cover DOS vulnerabilities in IOS SSH and the Secure Control Engine (SCE) and one privilege escalation in Cisco Voice Portal (CVP).

While the "Exploitation and Public Announcements" portion of all three advisories states that the vulns were discovered in-house, it's a pretty safe bet that a fair number of security "researchers" are feverishly reverse engineering the updates to develop exploits for private use and/or public release.

Anytime we see a "spurious memory access" leading to a denial of service, thoughts immediately go to arbitrary code execution.  There is no evidence that this is possible, but in light of the recent work in IOS rootkits, vulns in Cisco devices should not be taken lightly.  Sebastian Muniz of CORE Security is scheduled to release a proof of concept Cisco IOS rootkit tomorrow at EuSecWest.  Stand by for more details.

Read 'em and update:

Cisco IOS Secure Shell Denial of Service Vulnerabilities
http://www.cisco.com/en/US/products/products_security_advisory09186a008099567f.shtml

Cisco Service Control Engine Denial of Service Vulnerabilities
http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml

Cisco Voice Portal Privilege Escalation Vulnerability
http://www.cisco.com/en/US/products/products_security_advisory09186a008099beae.shtml

Cheers,
g

George

25 Posts
May 21st 2008

Sign Up for Free or Log In to start participating in the conversation!