TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Cisco buffer overflow vulnerability with remote code execution

111 点作者 silenteh超过 9 年前

7 条评论

silenteh超过 9 年前
Here a nice explanation of the vulnerability: <a href="https:&#x2F;&#x2F;blog.exodusintel.com&#x2F;2016&#x2F;02&#x2F;10&#x2F;firewall-hacking&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.exodusintel.com&#x2F;2016&#x2F;02&#x2F;10&#x2F;firewall-hacking&#x2F;</a><p>There is also a Snort signature to detect attempts to exploit this vulnerability.
评论 #11094658 未加载
madsushi超过 9 年前
Cisco was also rushed to release the fix, as all of the new builds are tagged &#x27;interim&#x27; and warn users that they have bugs and stability problems that will be fixed later. Most notably, several issues with ASA Clustering were found in the new builds. So you&#x27;re damned if you do, damned if you don&#x27;t.
tyingq超过 9 年前
Edit...this is wrong-&gt; <i>It&#x27;s specific to Cisco ASA firewalls with a version level &lt; 9.1(7), which was released in January of 2015.</i><p>Edit: Gelob, below, is right. There&#x27;s a really unfortunate &quot;read more&quot; link that hides the important bits on Cisco&#x27;s documentation and caused my confusion.
评论 #11094098 未加载
评论 #11094081 未加载
achillean超过 9 年前
Here&#x27;s an overview of devices that are running IKE on the Internet at the moment: <a href="https:&#x2F;&#x2F;www.shodan.io&#x2F;report&#x2F;h2Naw1fd" rel="nofollow">https:&#x2F;&#x2F;www.shodan.io&#x2F;report&#x2F;h2Naw1fd</a>
xyzzy4超过 9 年前
As someone who used to work at Cisco, I&#x27;m not surprised. Everything is coded in C, and there are memory leaks all over the place because releases are made before most of these bugs are fixed.
virtualwhys超过 9 年前
&gt; Note: Only traffic directed to the affected system can be used to exploit this vulnerability.<p>I&#x27;m confused, how else would the system be compromised, by directing traffic at the moon?<p>Running an EOL ASA in colo on v8.2. Have been holding out due to the post-v8.2 changes to NAT. Looks like you need a SmartNET contract to get the fix, unfortunate, many legacy devices will left vulnerable as a result.<p>Well, there goes the weekend...
评论 #11096323 未加载
评论 #11095826 未加载
评论 #11097742 未加载
评论 #11095852 未加载
评论 #11096138 未加载
SpyKiIIer超过 9 年前
Rackspace pushed this update to all their clients last night, as they have seen this attack against some of their infrastructure...