TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cisco buffer overflow vulnerability with remote code execution

111 pointsby silentehover 9 years ago

7 comments

silentehover 9 years ago
Here a nice explanation of the vulnerability: <a href="https:&#x2F;&#x2F;blog.exodusintel.com&#x2F;2016&#x2F;02&#x2F;10&#x2F;firewall-hacking&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.exodusintel.com&#x2F;2016&#x2F;02&#x2F;10&#x2F;firewall-hacking&#x2F;</a><p>There is also a Snort signature to detect attempts to exploit this vulnerability.
评论 #11094658 未加载
madsushiover 9 years ago
Cisco was also rushed to release the fix, as all of the new builds are tagged &#x27;interim&#x27; and warn users that they have bugs and stability problems that will be fixed later. Most notably, several issues with ASA Clustering were found in the new builds. So you&#x27;re damned if you do, damned if you don&#x27;t.
tyingqover 9 years ago
Edit...this is wrong-&gt; <i>It&#x27;s specific to Cisco ASA firewalls with a version level &lt; 9.1(7), which was released in January of 2015.</i><p>Edit: Gelob, below, is right. There&#x27;s a really unfortunate &quot;read more&quot; link that hides the important bits on Cisco&#x27;s documentation and caused my confusion.
评论 #11094098 未加载
评论 #11094081 未加载
achilleanover 9 years ago
Here&#x27;s an overview of devices that are running IKE on the Internet at the moment: <a href="https:&#x2F;&#x2F;www.shodan.io&#x2F;report&#x2F;h2Naw1fd" rel="nofollow">https:&#x2F;&#x2F;www.shodan.io&#x2F;report&#x2F;h2Naw1fd</a>
xyzzy4over 9 years ago
As someone who used to work at Cisco, I&#x27;m not surprised. Everything is coded in C, and there are memory leaks all over the place because releases are made before most of these bugs are fixed.
virtualwhysover 9 years ago
&gt; Note: Only traffic directed to the affected system can be used to exploit this vulnerability.<p>I&#x27;m confused, how else would the system be compromised, by directing traffic at the moon?<p>Running an EOL ASA in colo on v8.2. Have been holding out due to the post-v8.2 changes to NAT. Looks like you need a SmartNET contract to get the fix, unfortunate, many legacy devices will left vulnerable as a result.<p>Well, there goes the weekend...
评论 #11096323 未加载
评论 #11095826 未加载
评论 #11097742 未加载
评论 #11095852 未加载
评论 #11096138 未加载
SpyKiIIerover 9 years ago
Rackspace pushed this update to all their clients last night, as they have seen this attack against some of their infrastructure...