YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

New Cisco Flaw Prompts Symantec to Raise Internet Threat Level

Posted On 12 Sep 2005
By : admin

SAN JOSE, CA – In a security advisory issued Wednesday, Cisco Systems reported a vulnerability in their Internetwork Operating System, which could be exploited to run code remotely on devices that the IOS.“The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature in specific versions of Cisco IOS software is vulnerable to a remotely-exploitable buffer overflow condition,” the company states in the summary of the advisory.

The advisory warns that successful exploitation of the vulnerability “may result in a reload of the device or execution of arbitrary code. Repeated exploitation could result in a sustained DoS attack or execution of arbitrary code on Cisco IOS devices.”

Cisco’s announcement lead security software vendor Symantec to heighten its “ThreatCon” global threat index to Level 2, meaning an attack is “expected.”

“Given the recent attention to exploitation of vulnerabilities in Cisco’s IOS it is possible that this issue will see attempts at exploit development in the near term,” Symantec stated in an advisory. Both Symantec and Cisco have said that there are no known exploits or attacks taking advantage of the vulnerability currently, however.

According to Cisco’s advisory, the vulnerability does not affect all versions of their IOS, and the flaw only exists if the Firewall Authentication Proxy for FTP and Telnet Sessions is in use. Cisco lists the devices affected as those running IOS versions 12.2ZH, 12.2ZL, 12.3, 12.3T, 12.4 and 12.4T.

Cisco has made upgraded software available that patches the problem. Symantec has advised users who can’t install the patch immediately to disable the Firewall Authentication Proxy for FTP and Telnet Sessions, or limit access to the service to trusted hosts and networks.

For the full text of Cisco’s security advisory, go to cisco.com.

  • google-share
Previous Story

Online Dating Encounters Lead to Lawsuit Against Manhattan Man

Next Story

Penthouse to Start Its Own Adult Entertainment Broadcast Network

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • Adult Site Broker
    General Business Services
  • Sex Toy Distributing
    Novelty & Lingerie Distributors
  • Williams Trading Co
    Novelty & Lingerie Distributors
  • Premiere Listing

    YNOT Mail

    More Details

RECENT

POPULAR

COMMENTS

Justine Jakobs Crowned Nookies Newest Rookie

Posted On 01 Jul 2025

Rookie Faith Vixen Vies to Defeat Cody Carter at Evolved Fights

Posted On 01 Jul 2025

Mag Numb Drops Extra Spicy Date Night Scene

Posted On 01 Jul 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy