[Snort-sigs] Suggested Sig for Cisco DOS Vulnerability

Klun, Jim Jim_Klun at ...1688...
Mon Jul 21 05:25:27 EDT 2003


It works.

-----Original Message-----
From: Michael Scheidell [mailto:scheidell at ...249...]
Sent: Friday, July 18, 2003 10:01 AM
To: Compton, Rich
Cc: 'snort-sigs at lists.sourceforge.net';
Snort-users at lists.sourceforge.net
Subject: Re: [Snort-sigs] Suggested Sig for Cisco DOS Vulnerability


> Hey guys, 
> Doesn't look like a exploit exists as of yet but Cisco just released what
IP
> protocols cause the DOS so it won't be long until there is one!

from http://www.theregister.co.uk/content/55/31825.html
someone sent shadowchode.tar.gz to [Full-Disclosure] list.

Cisco IOS DoS exploit released in the wild 
By John Leyden
Posted: 18/07/2003 at 12:01 GMT

The risk posed by a serious DoS vulnerability to a wide range of Cisco
Systems routers and switches has been upgraded following the release of an
exploit onto a full disclosure mailing list. 


-------------------------------------------------------
This SF.net email is sponsored by: VM Ware
With VMware you can run multiple operating systems on a single machine.
WITHOUT REBOOTING! Mix Linux / Windows / Novell virtual machines at the
same time. Free trial click here: http://www.vmware.com/wl/offer/345/0
_______________________________________________
Snort-sigs mailing list
Snort-sigs at lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/snort-sigs




More information about the Snort-sigs mailing list