通信人家园

标题: [转帖]思科的设备也脆弱过,产品开发的兄弟们注意了  [查看完整版帖子] [打印本页]

时间:  2007-4-17 13:50
作者: rj45rt     标题: [转帖]思科的设备也脆弱过,产品开发的兄弟们注意了

<h2>Cisco wireless products suffer multiple vulns</h2><h3 class="Standfirst">These bugs can bite</h3><div class="Date"><small></small></div><script type="text/javascript"></script>Cisco Systems is reporting multiple vulnerabilities in three popular wireless products that can unleash all kinds of nastiness, including denials of service, privilege escalation, information disclosure and the ability to gain full administrative access.<div id="Body"><p>The flaws reside in Cisco's Wireless Control System (WCS), Wireless LAN Controller and Lightweight Access Points.&nbsp;<noscript></noscript></p><p>Vulnerabilities in WCS include Fixed FTP Credentials for Location Backup, Account Group Privilege Escalation and Information Disclosure to Unauthenticated Users. Miscreants could exploit these flaws to write arbitrary files to the server that is hosting the WCS application, alter system files, and change an account group membership to gain full control of the WCS. Oh yeah, and all three can be exploited remotely.</p><p>The other two products suffer from five vulnerabilities, the most serious one affecting default SNMP community strings. That can also be exploited remotely and could allow an attacker to gain complete control of the device.</p><p>Cisco is advising administrators to apply fixes and workarounds. The advisories can be found <a href="http://www.cisco.com/en/US/products/products_security_advisory09186a008081e18d.shtml" target="_blank">here</a> and <a href="http://www.cisco.com/en/US/products/products_security_advisory09186a008081e189.shtml" target="_blank">here</a>. &reg;</p></div>




通信人家园 (https://www.txrjy.com/) Powered by C114