First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Cisco IOS updates fix 10 denial-of-service vulnerabilities
- — 27 September, 2013 14:12
Cisco Systems has patched 10 vulnerabilities that could impact the availability of devices using various versions of its IOS software.
IOS is a multitasking operating system that combines networking and telecommunications functions and is used on many of the company's networking devices.
All of the patched vulnerabilities can impact a device's availability if exploited. They affect Cisco IOS implementations of the Network Time Protocol (NTP), the Internet Key Exchange protocol, the Dynamic Host Configuration Protocol (DHCP), the Resource Reservation Protocol (RSVP), the virtual fragmentation reassembly (VFR) feature for IP version 6 (IPv6), the Zone-Based Firewall (ZBFW) component, the T1/E1 driver queue and the Network Address Translation (NAT) function for DNS (Domain Name System) and PPTP (Point-to-Point Tunneling Protocol).
These vulnerabilities can be exploited by remote, unauthenticated attackers by sending specifically crafted packets over the network to IOS devices that have the affected features enabled.
Depending on the targeted vulnerability, attackers can cause the affected devices to hang, reload, lose connection, lose their ability to route connections or trigger other types of denial-of-service (DoS) conditions.
Workarounds for the NTP, ZBFW, T1/E1 driver queue and RSVP flaws are available and are described in the corresponding security advisories released by Cisco this week. To mitigate the other vulnerabilities, users will have to install patched versions of the IOS software, depending on which versions their devices already use.
"The effectiveness of any workaround or fix depends on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission," Cisco said. "Because of the variety of affected products and releases, customers should consult their service providers or support organizations to ensure that any applied workaround or fix is the most appropriate in the intended network before it is deployed."
The company is not aware of any malicious exploitation or detailed public disclosure of these vulnerabilities. They were discovered during internal security reviews or while troubleshooting customer service reports.