Feeds

Cisco protects routers against 'Black Hat' bug

Double plus bad

Security for virtualized datacentres

Cisco has warned users of a flaw in its IOS (Internetwork Operating System) software which might be used by hackers to bypass security restrictions and run hostile code on network devices. The vulnerability reportedly affects all Cisco products that run Cisco IOS software, including routers and a limited range of switches that don't run CatOS. The networking giant has released fixes for the 12.x releases of its software as explained in a patching matrix here.

The security flap stems from a heap-based buffer overflow security bug involving internal operating system timers. This might be exploited in conjunction with some other heap-based buffer overflow vulnerability to run hostile code on vulnerable systems.

In a statement, Cisco said it had not received any reports about active exploitation of the vulnerability. It explained that the security flaw was related to security bugs outlined in a presentation by security researcher Michael Lynn at Black Hat in July. This presentation became a cause celebre in the security research community after Cisco controversially obtained a restraining order to suppress publication of Lynn's findings.

"This advisory documents changes to Cisco IOS as a result of continued research related to the demonstration of the exploit for another vulnerability which occurred in July 2005 at the Black Hat USA Conference. Cisco addressed the IPv6 attack vector used in that demonstration in a separate advisory published on 29 July 2005," it said. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.