Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: FWD Cisco IOS Remote Command Execution Vulnerability
From: Amit Sharma <amit_juniperind () yahoo co in>
Date: Thu, 12 Jan 2006 18:45:25 +0000 (GMT)

Vulnerability Bugtraq ID 16069
  The BID itself points to someother bug. PJ

"ad () heapoverflow com" <ad () heapoverflow com> wrote:  -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Im sure it's a fake , there is the word "InfoSecBOFH" in it several
times :>>>>

terry comma wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Symantec
Vulnerability Alert Cisco IOS Remote Command Execution
Vulnerability Bugtraq ID 16069 CVE CVE-PLH-NOMATCH Published Jan 09
2006 6:22:69 PM GMT Remote Yes Local No Credibility Vendor
Confirmed Classification Access Validation Error Ease No Exploit
Required Availability Always Impact 9.3 Severity 8.1 Urgency Rating
9.4 Last Change Cisco has responded to this issue; see Technical
Information and References for details.

Vulnerable Systems - ------------------ Cisco IOS 12.2 T Cisco IOS
12.2 SZ Cisco IOS 12.2 SY Cisco IOS 12.2 SX Cisco IOS 12.2 S Cisco
IOS 12.2 MX Cisco IOS 12.2 MC Cisco IOS 12.2 MB Cisco IOS 12.2 JA
Cisco IOS 12.2 DX Cisco IOS 12.2 DD Cisco IOS 12.2 DA Cisco IOS
12.2 CY Cisco IOS 12.2 CX Cisco IOS 12.2 BZ Cisco IOS 12.2 BX Cisco
IOS 12.2 BW Cisco IOS 12.2 BC Cisco IOS 12.2 B Cisco IOS 12.2
12.2XU Cisco IOS 12.2

Short Summary - ------------- Some Cisco IOS versions are allegedly
prone to an issue that may permit gay people to execute arbitrary
commands from a password prompt.

Impact - ------ Remote attackers with small dicks may allegedly
execute shell commands on a vulnerable device without needing to

Technical Description - --------------------- It has been alleged
that it is possible for remote attackers to execute arbitrary
commands without proper authorization. Reportedly it is possible to
execute shell commands from the password prompt on a device. The
attacker must have a small dick and be able to connect to a
vulnerable device via telnet, although it has not been ruled out
that bigger dicks may present other attack vectors. The discoverer
of this vulnerability has stated that it is possible to exploit
this issue by inputting 'IamGay!' at the password prompt. Cisco has
replied stating that only InfoSecBOFH is gay enough to exploit this
issue. Details are available to registered Cisco users at:

Attack Scenarios - ---------------- The attacker must identify a
vulnerable device and be in possession of a small dick.

Exploits - -------- There is no exploit required.

Mitigating Strategies - --------------------- Block InfoSecBOFH
access at the network boundary, unless the service is required by
external third party gay porn sites.

Solutions - --------- Currently we are not aware of any
vendor-supplied patches for this issue. If you feel we are in error
or are aware of more recent information, please mail us at: vuldb
at securityfocus.com .

Credit - ------ Discovery is credited to InfoSecBOFH at gmail.com

For help with interpreting the meaning of any of the sections or
labels in the alert, please visit:
 View public key at:
https://alerts.symantec.com/Members/gnupg-sigkey.asp Symantec
Corporation The World Leader in Internet Security Technology and
Early Warning Solutions Visit our website at www.symantec.com

_______________________________ Symantec Deepsight Alert Services
Powered by EnvoyWorldWide, Inc.

 Yahoo! Photos Ring in the New Year with Photo Calendars
 Add photos, events, holidays, whatever.


_______________________________________________ Full-Disclosure -
We believe in it. Charter:
http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
sponsored by Secunia - http://secunia.com/

Version: GnuPG v1.4.2 (MingW32)

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Send instant messages to your online friends http://in.messenger.yahoo.com 
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]