Document ID: 59684
Last Updated 2002 October 29
This document is provided to simplify access to Cisco responses to possible product security vulnerability issues posted in public forums for Cisco customers. This does not imply that Cisco perceives each of these issues as an actual product security vulnerability. This notice is provided on an "as is" basis and does not imply any kind of guarantee or warranty. Your use of the information on the page or materials linked from this page are at your own risk. Cisco reserves the right to change or update this page without notice at any time.
To: BugTraq Subject: Re: CISCO as5350 crashes with nmap connect scan Date: Oct 29 2002 10:31PM Author: Wendy Garvin <firstname.lastname@example.org> Message-ID: <20021029223138.GB17617@cisco.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Thomas, I appreciate your communication with Cisco PSIRT on September 9th regarding questions on a 5350. Your original problem was due to a misconfiguration, and appropriate configuration details were provided within a day of your request. No crash was mentioned to us. This evening I have worked in the lab on both a 5300 and a 5350 running 12.2(11)T. I have run nmap as you suggested with a slight change, there is no -d option, I assume you meant -Tinsane. I have been unable to reproduce your results. Cisco takes vulnerabilities with our devices very seriously, and if you can show us how to reproduce this problem, we'd be very interested in fixing it. Please contact us with detailed version information and any specifics on your setup, and we'd be happy to continue working with you. As always, the appropriate way to contact us is by emailing psirt cisco com For technical assistance and configuration issues, please contact tac cisco com Thank you, - -Wendy - -- Wendy Garvin - Cisco PSIRT - 408 525-1888 CCIE# 6526 - ---------------------------------------------------- http://www.cisco.com/go/psirt > Thomas Munn <munn bigfoot com> [2002-10-28 14:52] wrote: > > > I have managed to "reduplicate" at least five times the > following scenario with a cisco as5250, with firmwrare > 12.2 (11t) release firmware of cisco: > > nmap -dinsane -p 1-65535 ip.of.as5350 This causes a > "hard" lockup, and the device must be powered off in > order to have functionality restored to it. > > Mentioned to PSIRT at cisco, they didn't do anything. > > Sincerely, > > Thomas J. Munn > > [ ----- End of Included Message ----- ] -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.2 iQA/AwUBPb32BZPS/wbyNnWcEQLRmwCdFq+tAX9zRxktmZW5DRZ4YNArmXcAoLy/ fygu/v2CA8NihUn/C00v2Hpf =0REH -----END PGP SIGNATURE-----
Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt.
|Updated: Oct 08, 2004||Document ID: 59684|