[c-nsp] Cisco Security Advisory: Cisco Catalyst 6000, 6500 and Cisco 7600 Series MPLS Packet Vulnerability

Dale W. Carder dwcarder at doit.wisc.edu
Wed Feb 28 12:17:39 EST 2007


Thus spake Jared Mauch (jared at puck.nether.net) on Wed, Feb 28, 2007 at 12:08:28PM -0500:
> On Wed, Feb 28, 2007 at 06:59:36PM +0200, Saku Ytti wrote:
> > On (2007-02-28 17:00 +0100), Cisco Systems Product Security Incident Response Team wrote:
> > 
> > > Cisco Security Advisory: Cisco Catalyst 6000, 6500 and Cisco 7600
> > > Series MPLS Packet Vulnerability
> > 
> > >   * Cisco Catalyst 6500 systems that run 12.2(18)SXF4 with Cisco IOS
> > >     Software Modularity are affected.
> > 
> > Silly me, I thought that modularity is far from having MPLS or IPv6
> > implemented.
> 
> 	My guess is that's why it caused it to die.  Likely some poor
> error checking :(

I was thinking that one packet crashing the whole router didn't sound very
modular to me.  Shouldn't 'IP Input' just restart? ;-)

<sigh>

Dale


More information about the cisco-nsp mailing list