S-242: Vulnerability in Cisco IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-242: Vulnerability in Cisco IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor
# 1  
Old 03-27-2008
S-242: Vulnerability in Cisco IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor

Cetrain Cisco Catalyst 6500 Series and Cisco 7600 Router devices that run branches of Cisco IOS based on 12.2 can be vulnerable to a denial of service vulnerability that can prevent any traffic from entering an affected interface. The risk is LOW. Exploitation of this vulnerability may result in a blocked interface input queue, memory leak, and/or restart of the device. Repeated exploitation of this vulnerability may result in an extended denial of service.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. Solaris

Cisco IOS VPN server IKE

How do I tell if Cisco IOS VPN server IKE is running on my solaris 10 system (1 Reply)
Discussion started by: pgsanders
1 Replies

2. Shell Programming and Scripting

Need help on ssh login script to cisco ios

I'm trying to write a login script to ssh into a cisco switch that will run some command remotely. Similar to this expect script located here: SSH login expect shell script to supply username and password However, that script does not work with cisco ios. Anyway know what the best way to... (1 Reply)
Discussion started by: streetfighter2
1 Replies

3. Shell Programming and Scripting

continue after connecting to cisco vpn

Hi all, This will save me a tremendous amount of time if i can get this script working. I have alot of sites i need to connect to using cisco vpn and then ssh onto servers to retrieve some info. Its all repetitative and it needs scripted. what i have done so far is put this into a script. ... (0 Replies)
Discussion started by: borderblaster
0 Replies

4. IP Networking

Cisco vpn client

Who in the 64 ubuntu adopted cisco vpn client on the wireless network I downloaded the cisco vpn client for linux but run vpn_install make file when an error in cisco with the help of the document read in half a day, nor do I know this vpn client in the 64 systems in use. Who can help me, a... (1 Reply)
Discussion started by: Eason
1 Replies

5. UNIX for Dummies Questions & Answers

Patrol Supervisor can anyone help : /

Hello all Are you familiar with Patrol 3.5 software ? If so , I would like to know if in Patrol logs , we could find users' history ? Thank you (0 Replies)
Discussion started by: JuniorJack
0 Replies
Login or Register to Ask a Question
Info::Layer3::Aironet(3pm)				User Contributed Perl Documentation				Info::Layer3::Aironet(3pm)

NAME
SNMP::Info::Layer3::Aironet - Perl5 Interface to Cisco Aironet Wireless Devices running Aironet software, not IOS AUTHOR
Max Baker SYNOPSIS
# Let SNMP::Info determine the correct subclass for you. my $aironet = new SNMP::Info( AutoSpecify => 1, Debug => 1, DestHost => 'myswitch', Community => 'public', Version => 2 ) or die "Can't connect to DestHost. "; my $class = $aironet->class(); print "SNMP::Info determined this device to fall under subclass : $class "; DESCRIPTION
SNMP::Info subclass to provide access to SNMP data for an Aironet device running Aironet software, not cisco IOS. Note there are two classes for Aironet devices : SNMP::Info::Layer3::Aironet This class is for devices running Aironet software (older) SNMP::Info::Layer2::Aironet This class is for devices running Cisco IOS software (newer) For speed or debugging purposes you can call the subclass directly, but not after determining a more specific class using the method above. my $aironet = new SNMP::Info::Layer3::Aironet(...); Inherited Classes SNMP::Info::Layer3 Required MIBs AWCVX-MIB IEEE802dot11-MIB These MIBs are now included in the v2.tar.gz archive available from ftp.cisco.com. Make sure you have a current version. GLOBALS
These are methods that return scalar value from SNMP $aironet->awc_duplex() Gives the admin duplex setting for the Ethernet Port. "awcEtherDuplex.0" $aironet->mac() Gives the MAC Address of the wireless side "dot11StationID.2" $aironet->os() 'aironet' $aironet->os_ver Tries to cull the version from the description field. $aironet->vendor() Returns 'cisco'. Globals imported from SNMP::Info::Layer3 See documentation in "GLOBALS" in SNMP::Info::Layer3 for details. TABLE METHODS
These are methods that return tables of information in the form of a reference to a hash. Overrides $aironet->bp_index() Takes the bp_index() value from SNMP::Info::Bridge and overrides the wireless port to be assigned to the transparent bridge port (port 0) $aironet->fw_mac() Adds static table entries from bs_mac() to port 0 so that wireless MAC addresses will be reported. Forwarding table entries for port 0 are removed. $aironet->fw_port() Adds the static table port mappings to the forwarding table port mappings by adding bs_port() to fw_port() $aironet->i_duplex() Adds the value of awc_duplex() to each Ethernet port seen. $aironet->i_mac() Overrides the values for i_mac with the value from awc_mac() if they are set. $aironet->i_ignore() Ignores ports that are of type ``rptr'' and ``lo''. Aironet specific items $aironet->awc_default_mac() Gives the default MAC address of each interface. "awcIfDefaultPhyAddress" $aironet->awc_mac() Gives the actual MAC address of each interface. "awcIfPhyAddress" $aironet->awc_ip() Gives the IP Address assigned to each interface. "awcIfIpAddress" $aironet->awc_netmask() Gives the NetMask for each interface. "awcIfIpNetMask" $aironet->awc_msdu() "awcIfMSDUMaxLength" Table Methods imported from SNMP::Info::Layer3 See documentation in "TABLE METHODS" in SNMP::Info::Layer3 for details. perl v5.12.4 2011-09-28 Info::Layer3::Aironet(3pm)