From: Panda Oxygen3: "The wise man avoids evil by anticipating it." Publilius Syrus (~100 BC), Roman writer - Vulnerability in Cisco devices allows RADIUS authentication bypass - Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com) Madrid, June 30, 2005 - Cisco has reported, at http://www.cisco.com/warp/public/707/cisco-sa-20050629-aaa.shtml, a vulnerability in Cisco IOS devices with RADIUS (Remote Authentication Dial In User Service) authentication, which could allow a remote attacker to bypass this identification mechanism. According to the advisory published by the company, the problem occurs in devices with certain versions of Cisco IOS and configured with a fallback method to none. Systems that are configured for other authentication methods or that are not configured with a fallback method to none are not affected. The affected versions of Cisco IOS are: - 12.2T - 12.3 - 12.3T - 12.4 Cisco has released the updates necessary to avoid this problem, which are available from the Software Center on Cisco's website: http://www.cisco.com. Due to the diversity of vulnerable products and versions, it is recommendable to refer to the Cisco advisory to check the patch needed for each product version affected. NOTE: The address above may not show up on your screen as a single line. This would prevent you from using the link to access the web page. If this happens, just use the 'cut' and 'paste' options to join the pieces of the URL. ------------------------------------------------------------ The 5 viruses most frequently detected by Panda ActiveScan, Panda Software's free online scanner: 1)Mhtredir.gen; 2)Netsky.P; 3)Sdbot.ftp; 4)Mitglieder.DQ; 5)Qhost.gen. ------------------------------------------------------------ To contact with Panda Software, please visit: http://www.pandasoftware.com/about/contact/ ------------------------------------------------------------ *********** MIKE"S REPLY SEPARATOR *********** Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see a sample on my web page http://www3.telus.net/mikebike <mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe> http://www3.telus.net/mikebike/worm_removal.htm See my Anti-Virus pages http://virusinfo.hackfix.org/index <virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe> A Technical Support Alliance and OWTA Charter Member