Re: - Cisco IOS HTTP Server code injection/execution vulnerability-
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> picardos@xxxxxxxx <picardos@xxxxxxxx> [2005-11-28 16:01] wrote:
> It has been identified a vulnerability in the Cisco IOS Web Server. An
> attacker can inject
> arbitrary code in some of the dynamically generated web pages. To succesfully
> exploit the vulnerability the attacker only needs to know the IP of the
> Cisco. THERE'S NO NEED TO HAVE ACCESS TO THE WEB SERVER! Once the code has
> been inyected, attacker must wait until the admin browses some of the
> affected web pages.
>
> Full advisory and P.o.C. exploit that changes the "enable" password at:
>
> http://www.infohacking.com
> [ ----- End of Included Message ----- ]
Cisco has released an advisory regarding this issue. For workarounds,
fixes and more information regarding this vulnerability, please refer to:
http://www.cisco.com/warp/public/707/cisco-sa-20051201-http.shtml
- -Mike-
- --
- ----------------------------------------------------------------------
| || || | Mike Caudill <mcaudill@xxxxxxxxx> |
| || || | PSIRT Incident Manager |
| |||| |||| | DSS PGP: 0xEBBD5271 |
| ..:||||||:..:||||||:.. | +1.919.392.2855 / +1.919.522.4931 (cell) |
| C i s c o S y s t e m s | http://www.cisco.com/go/psirt |
- ----------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFDkHgiimPJSeu9UnERAsy3AJ4wWIN5oBE1N82sCoH6xwGZmAB35QCglP8F
0B6VqtHOUQA8s9PYSmz2qVg=
=aoxd
-----END PGP SIGNATURE-----