通信人家园

 找回密码
 注册

只需一步,快速开始

短信验证,便捷登录

搜索

军衔等级:

  少将

注册:2005-5-241
跳转到指定楼层
1#
发表于 2007-4-17 13:50:00 |只看该作者 |倒序浏览
<h2>Cisco wireless products suffer multiple vulns</h2><h3 class="Standfirst">These bugs can bite</h3><div class="Date"><small></small></div><script type="text/javascript"></script>Cisco Systems is reporting multiple vulnerabilities in three popular wireless products that can unleash all kinds of nastiness, including denials of service, privilege escalation, information disclosure and the ability to gain full administrative access.<div id="Body"><p>The flaws reside in Cisco's Wireless Control System (WCS), Wireless LAN Controller and Lightweight Access Points.&nbsp;<noscript></noscript></p><p>Vulnerabilities in WCS include Fixed FTP Credentials for Location Backup, Account Group Privilege Escalation and Information Disclosure to Unauthenticated Users. Miscreants could exploit these flaws to write arbitrary files to the server that is hosting the WCS application, alter system files, and change an account group membership to gain full control of the WCS. Oh yeah, and all three can be exploited remotely.</p><p>The other two products suffer from five vulnerabilities, the most serious one affecting default SNMP community strings. That can also be exploited remotely and could allow an attacker to gain complete control of the device.</p><p>Cisco is advising administrators to apply fixes and workarounds. The advisories can be found <a href="http://www.cisco.com/en/US/products/products_security_advisory09186a008081e18d.shtml" target="_blank">here</a> and <a href="http://www.cisco.com/en/US/products/products_security_advisory09186a008081e189.shtml" target="_blank">here</a>. &reg;</p></div>

举报本楼

您需要登录后才可以回帖 登录 | 注册 |

手机版|C114 ( 沪ICP备12002291号-1 )|联系我们 |网站地图  

GMT+8, 2024-11-25 23:36 , Processed in 0.111910 second(s), 15 queries , Gzip On.

Copyright © 1999-2023 C114 All Rights Reserved

Discuz Licensed

回顶部