Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: FWD Cisco IOS Remote Command Execution Vulnerability
From: "ad () heapoverflow com" <ad () heapoverflow com>
Date: Mon, 09 Jan 2006 23:24:19 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
Im sure it's a fake , there is the word "InfoSecBOFH" in it several
times :>>>>


terry comma wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Symantec
Vulnerability Alert Cisco IOS Remote Command Execution
Vulnerability Bugtraq ID 16069 CVE CVE-PLH-NOMATCH Published Jan 09
2006 6:22:69 PM GMT Remote Yes Local No Credibility Vendor
Confirmed Classification Access Validation Error Ease No Exploit
Required Availability Always Impact 9.3 Severity 8.1 Urgency Rating
9.4 Last Change Cisco has responded to this issue; see Technical
Information and References for details.

Vulnerable Systems - ------------------ Cisco IOS 12.2 T Cisco IOS
12.2 SZ Cisco IOS 12.2 SY Cisco IOS 12.2 SX Cisco IOS 12.2 S Cisco
IOS 12.2 MX Cisco IOS 12.2 MC Cisco IOS 12.2 MB Cisco IOS 12.2 JA
Cisco IOS 12.2 DX Cisco IOS 12.2 DD Cisco IOS 12.2 DA Cisco IOS
12.2 CY Cisco IOS 12.2 CX Cisco IOS 12.2 BZ Cisco IOS 12.2 BX Cisco
IOS 12.2 BW Cisco IOS 12.2 BC Cisco IOS 12.2 B Cisco IOS 12.2
12.2XU Cisco IOS 12.2

Short Summary - ------------- Some Cisco IOS versions are allegedly
prone to an issue that may permit gay people to execute arbitrary
commands from a password prompt.

Impact - ------ Remote attackers with small dicks may allegedly
execute shell commands on a vulnerable device without needing to
authenticate.

Technical Description - --------------------- It has been alleged
that it is possible for remote attackers to execute arbitrary
commands without proper authorization. Reportedly it is possible to
execute shell commands from the password prompt on a device. The
attacker must have a small dick and be able to connect to a
vulnerable device via telnet, although it has not been ruled out
that bigger dicks may present other attack vectors. The discoverer
of this vulnerability has stated that it is possible to exploit
this issue by inputting 'IamGay!' at the password prompt. Cisco has
replied stating that only InfoSecBOFH is gay enough to exploit this
issue. Details are available to registered Cisco users at:
http://www.cisco.com/pcgi-bin/Support/InfoSecBOFH/ishegay.pl?bugid=CSCdr16069


Attack Scenarios - ---------------- The attacker must identify a
vulnerable device and be in possession of a small dick.

Exploits - -------- There is no exploit required.

Mitigating Strategies - --------------------- Block InfoSecBOFH
access at the network boundary, unless the service is required by
external third party gay porn sites.

Solutions - --------- Currently we are not aware of any
vendor-supplied patches for this issue. If you feel we are in error
or are aware of more recent information, please mail us at: vuldb
at securityfocus.com <mailto:vuldb at securityfocus.com>.

Credit - ------ Discovery is credited to InfoSecBOFH at gmail.com

For help with interpreting the meaning of any of the sections or
labels in the alert, please visit:
https://alerts.symantec.com/help/sia-users/vulnerability-alert-pdf.htm
 View public key at:
https://alerts.symantec.com/Members/gnupg-sigkey.asp Symantec
Corporation The World Leader in Internet Security Technology and
Early Warning Solutions Visit our website at www.symantec.com
<http://www.symantec.com/>

_______________________________ Symantec Deepsight Alert Services
Powered by EnvoyWorldWide, Inc.

----------------------------------------------------------------------
 Yahoo! Photos Ring in the New Year with Photo Calendars
<http://us.rd.yahoo.com/mail_us/taglines/photos/*http://pa.yahoo.com/*http://us.rd.yahoo.com/mail_us/taglines/photos/evt=38087/*http://pg.photos.yahoo.com/ph//page?.file=calendar_splash.html&.dir=>.
 Add photos, events, holidays, whatever.

----------------------------------------------------------------------


_______________________________________________ Full-Disclosure -
We believe in it. Charter:
http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
sponsored by Secunia - http://secunia.com/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
 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=1vmI
-----END PGP SIGNATURE-----


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault