SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Cisco Systems, Inc. (CSCO)
CSCO 76.04-0.3%3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: The Phoenix who wrote (16275)8/26/1998 7:47:00 PM
From: david jung  Read Replies (2) of 77400
 
Gary all pointers given were correct.
It worked for me using WinNT, IE3.01.
Here's it is
techweb.com
Cisco Software Bug Exposes Routers To Hackers
(08/24/98; 7:13 p.m. ET)
By Kimberly Caisse, Computer Reseller News

Cisco Systems has notified its customers about a bug in its Internetwork Operating System (IOS) software that breaches the security of most of its router products.

An unauthorized entry could cause Cisco networking devices running IOS to crash and reload without having to log in to the router, according to Cisco, based in San Jose, Calif. Most of Cisco's router products are vulnerable to the bug.

Hardware such as Cisco's 700 series dial-up routers, Catalyst LAN switches, IGX and BPX WAN switches, and LS1010 and LS202 ATM switches are not affected because they do not run classic Cisco IOS.

In addition, "all users of classic Cisco IOS software versions 9.1 and later, whose devices can be connected to interactively by untrusted users, are affected by this vulnerability," Cisco's website said.

To fix the bug, Cisco (company profile) estimates a customer will have to upgrade the software on the two or three routers connected to the Internet, which are the most vulnerable to hackers, said Peter Long, Cisco's director of IOS marketing.

Cisco is providing free software upgrades to customers, Long said. Corrected IOS versions are 11.3, 11.3ED, 11.3T, 11.2, 11.2P, 11.2XA, 11.2BC, 11.2SA3, 11.1CA, 11.1, 11.1AA, 11.1CC, 11.1CT, and 11.0. However, Cisco does not plan corrections for versions 10.3 and below.

Customers without service contracts can only upgrade the images of the version they already use unless they operate version 10.3 or older. Customers with the older versions will get complete updates, but Cisco said the networking hardware may not support the newer IOS versions.

For those customers who do not want to upgrade, there are other ways to fix this security problem, Cisco said. For IP-based access devices, resellers can use the IP access-class line configuration, which drops data packets that are directed specifically to go to a router. Unauthorized access is completely preventable if the "no exec" command is applied to any asynchronous or virtual terminal line or if the "transport input none" command is applied to any virtual terminal line.

So-called workarounds add to your defenses against hackers, Long said.

Cisco software engineers found the bug while testing IOS, but so far, no customers have experienced problems, Long said.

The biggest problem a situation like this presents for resellers is a "mass-hysteria reaction" from customers concerned about a network security breach, said Tom Nolles, president of CIMI, a research firm in Voorhees, N.J. It is probably a good idea for resellers to proactively alert their customers about the bug, he said.

"IOS has actually been very solid," Nolles said.

David
WallStreet Links
members.tripod.com

Long Distance Rate Calculator
longdistance.freeservers.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext