Gary all pointers given were correct. It worked for me using WinNT, IE3.01. Here's it is techweb.com Cisco Software Bug Exposes Routers To Hackers (08/24/98; 7:13 p.m. ET) By Kimberly Caisse, Computer Reseller News
Cisco Systems has notified its customers about a bug in its Internetwork Operating System (IOS) software that breaches the security of most of its router products.
An unauthorized entry could cause Cisco networking devices running IOS to crash and reload without having to log in to the router, according to Cisco, based in San Jose, Calif. Most of Cisco's router products are vulnerable to the bug.
Hardware such as Cisco's 700 series dial-up routers, Catalyst LAN switches, IGX and BPX WAN switches, and LS1010 and LS202 ATM switches are not affected because they do not run classic Cisco IOS.
In addition, "all users of classic Cisco IOS software versions 9.1 and later, whose devices can be connected to interactively by untrusted users, are affected by this vulnerability," Cisco's website said.
To fix the bug, Cisco (company profile) estimates a customer will have to upgrade the software on the two or three routers connected to the Internet, which are the most vulnerable to hackers, said Peter Long, Cisco's director of IOS marketing.
Cisco is providing free software upgrades to customers, Long said. Corrected IOS versions are 11.3, 11.3ED, 11.3T, 11.2, 11.2P, 11.2XA, 11.2BC, 11.2SA3, 11.1CA, 11.1, 11.1AA, 11.1CC, 11.1CT, and 11.0. However, Cisco does not plan corrections for versions 10.3 and below.
Customers without service contracts can only upgrade the images of the version they already use unless they operate version 10.3 or older. Customers with the older versions will get complete updates, but Cisco said the networking hardware may not support the newer IOS versions.
For those customers who do not want to upgrade, there are other ways to fix this security problem, Cisco said. For IP-based access devices, resellers can use the IP access-class line configuration, which drops data packets that are directed specifically to go to a router. Unauthorized access is completely preventable if the "no exec" command is applied to any asynchronous or virtual terminal line or if the "transport input none" command is applied to any virtual terminal line.
So-called workarounds add to your defenses against hackers, Long said.
Cisco software engineers found the bug while testing IOS, but so far, no customers have experienced problems, Long said.
The biggest problem a situation like this presents for resellers is a "mass-hysteria reaction" from customers concerned about a network security breach, said Tom Nolles, president of CIMI, a research firm in Voorhees, N.J. It is probably a good idea for resellers to proactively alert their customers about the bug, he said.
"IOS has actually been very solid," Nolles said.
David WallStreet Links members.tripod.com
Long Distance Rate Calculator longdistance.freeservers.com |