|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CISCO >> CSCdi36962 Vulnerability Assessment Details
|
CSCdi36962 |
||
Uses SNMP to determine if a flaw is present Detailed Explanation for this Vulnerability Assessment The remote seems to be vulnerable to a flaw in IOS when the keyword 'tacacs-ds' or 'tacacs' is being used in extended ACLs. This bug can, under very specific circumstances and only with certain IP host implementations, permit unauthorized packets to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID CSCdi36962. Solution : http://www.cisco.com/warp/public/707/1.html Network Security Threat Level: High *** As Nessus solely relied on the banner of the remote host *** this might be a false positive Networks Security ID: 703 Vulnerability Assessment Copyright: This script is (C) 2002 Renaud Deraison |
||
Cables, Connectors |
Knoppix 9.1 Live Linux GNU Bootable USB Flash Drive USA
$19.99
$8.50
Knoppix Live GNU Linux System 9.1 on Bootable CD / DVD / USB Flash Drive
$9.99
Linux Knoppix 4.0.2 Installation Disc
$39.99
$12.00
Knoppix Linux Bootable OS v8.6 "Original Live Operating System" 32G USB Stick
$20.30
KNOPPIX 9.1 LINUX INSTALL & LIVE DVD
$9.99
Acer Aspire One 9 inch Netbook ZG5 512MB RAM 8GB SSD HD Knoppix Linux WiFi VGA
$79.99
New Knoppix 9.2 Pro Bootable Live OS x86 64Bit DVD Linux
$9.97
Knoppix Linux Bootable OS v8.6 "Original Live Operating System" 16G USB Stick
$19.95
|
||
No Discussions have been posted on this vulnerability. |