Re: FW: CISCO ALERT - Cisco warns of holes in PIX firewalls

  • From: "Greg Mulholland" <gmulholland@xxxxxxxxxxxxxxx>
  • To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx>
  • Date: Tue, 23 Dec 2003 10:06:02 +1100

Yes Jim

I would really like to expose SNMP on my firewall. Thanks  :)

Greg 

-----Original Message-----
From: Jim Harrison [mailto:jim@xxxxxxxxxxxx] 
Sent: Tuesday, December 23, 2003 2:58 AM
To: [ISAserver.org Discussion List]
Subject: [isalist] Re: FW: CISCO ALERT - Cisco warns of holes in PIX
firewalls

http://www.ISAserver.org

"I want HTTP administration of ISA Server"
Didn't we hear those words somewhere on this list and in the NG before?
I've also dealt with a customer that wanted SNMP management of ISA as
well.

..idiots..
:-(

 Jim Harrison
 MCP(NT4, W2K), A+, Network+, PCG
 http://www.microsoft.com/isaserver
 http://isaserver.org/Jim_Harrison
 http://isatools.org

 Read the help, books and articles!
----- Original Message -----
From: "Thomas W Shinder" <tshinder@xxxxxxxxxxxxxxxxxx>
To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx>
Sent: Friday, December 19, 2003 12:48
Subject: [isalist] FW: CISCO ALERT - Cisco warns of holes in PIX
firewalls


http://www.ISAserver.org

So much for the miracle of the "hardware" firewall :-)

Network World's Cisco News Alert

Cisco warns of holes in PIX firewalls
By Paul Roberts
IDG News Service, 12/16/03

Network equipment maker Cisco is warning customers about
security holes in its PIX firewall product and firewall software
that runs on the Catalyst 6500 Series and 7600 Series switches.

Cisco issued two security advisories on Monday describing
vulnerabilities that could allow remote attackers to shut down
Cisco firewalls using HTTP or SNMP requests designed to exploit
the weaknesses.

Certain versions of the PIX firewall can be crashed and
restarted in a so-called denial-of-service (DoS) attack when
they receive messages using the SNMP version 3 (SNMPv3)
protocol, an updated version of SNMP, which allows organizations
to monitor the status of network devices. PIX firewalls do not
support SNMPv3, Cisco said.

An SNMP server must be defined for the Cisco firewall in order
for SNMPv3 attack to succeed, Cisco said.

Catalyst switches running the Cisco Firewall Services Module
(FWSM) are also vulnerable to DoS attacks using SNMPv3, Cisco
said. The FWSM is software, based on the PIX Operating System,
that allows Cisco customers to use their high-performance
Catalyst switches as firewalls.

In addition to the SNMPv3 vulnerability, a second buffer
overflow vulnerability discovered in the FWSM could allow a
malicious hacker using either RADIUS or TACACS+ to crash a Cisco
firewall with a user authentication request sent using HTTP,
Cisco said. RADIUS and TACACS+ are both client/server protocols
that allow remote access servers to communicate with a central
authentication server and authorize a remote user's access to a
requested network system or service.

------------------------------------------------------
List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ
------------------------------------------------------
Other Internet Software Marketing Sites:
Leading Network Software Directory: http://www.serverfiles.com
No.1 Exchange Server Resource Site: http://www.msexchange.org
Windows Security Resource Site: http://www.windowsecurity.com/
Network Security Library: http://www.secinf.net/
Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com
------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
jim@xxxxxxxxxxxx
To unsubscribe send a blank email to
$subst('Email.Unsub')


------------------------------------------------------
List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ
------------------------------------------------------
Other Internet Software Marketing Sites:
Leading Network Software Directory: http://www.serverfiles.com
No.1 Exchange Server Resource Site: http://www.msexchange.org
Windows Security Resource Site: http://www.windowsecurity.com/
Network Security Library: http://www.secinf.net/
Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com
------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
gmulholland@xxxxxxxxxxxxxxx
To unsubscribe send a blank email to
$subst('Email.Unsub')




Other related posts: