Secunia Advisory: SA26988  
Release Date: 2007-09-27

Critical: Not critical
Impact: Security Bypass
Where: From local network
Solution Status: Vendor Patch

OS: Cisco 7600 Series 12.x
Cisco Catalyst 6500 Series 12.x

Description:
A weakness has been reported in Cisco Catalyst 6500 and Cisco 7600 series devices, which can be exploited by malicious people to bypass certain security restrictions.

The problem is that packets destined for the 127.0.0.0/8 network may be received and processed by e.g. the Supervisor module or Multilayer Switch Feature Card (MSFC). This can be exploited to e.g. bypass existing access control lists.

Successful exploitation requires that systems are running Hybrid Mode (Catalyst OS (CatOS) software on the Supervisor Engine and IOS Software on the MSFC) or Native Mode (IOS Software on both the Supervisor Engine and the MSFC).
The weakness is reported in all software versions on Cisco Catalyst 6500 and Cisco 7600 series prior to 12.2(33)SXH.

Solution:
Update to 12.2(33)SXH.

Provided and/or discovered by:
The vendor credits Lee E. Rian.

Original Advisory:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml

資料來源 Secunia
arrow
arrow
    全站熱搜
    創作者介紹
    創作者 ivan0914 的頭像
    ivan0914

    I'n Blog 之萬象真藏

    ivan0914 發表在 痞客邦 留言(0) 人氣()