BugTraq
Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Oct 10 2007 11:05AM
Damir Rajnovic (gaus cisco com) (1 replies)
Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Oct 11 2007 07:25PM
Halvar Flake (halvar flake sabre-security com) (2 replies)
Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Oct 11 2007 04:55PM
Florian Weimer (fw deneb enyo de)
* Halvar Flake:

> So in short, they are demonstrating that
>
> * IF you have console access
> * AND the enable password
> * AND you enable the debugger
>
> you can execute code ?
>
> So all in all, it's a complete non-issue ?

Not completely. There are some configurations in which EXEC mode is not
fully privileged. For instance, someone might be covertly capturing
flows passing through the router. The ability to execute arbitrary code
can be used to reveal that activity, and the router operator may not be
authorized to do so.

However, it seems to me that this is more or less a compliance thing,
not a security issue.

[ reply ]
RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Oct 10 2007 10:52PM
Andy Davis (andy davis irmplc com) (1 replies)
Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Oct 12 2007 06:32AM
Halvar Flake (halvar flake sabre-security com) (1 replies)
RE: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Oct 11 2007 07:32AM
Andy Davis (andy davis irmplc com) (1 replies)
Re: Cisco PSIRT response on IRM Demonstrates Multiple Cisco IOS Exploitation Techniques Oct 12 2007 12:57PM
Roman Medina-Heigl Hernandez (roman rs-labs com) (1 replies)


 

Privacy Statement
Copyright 2010, SecurityFocus