[c-nsp] 3750 and CVE-2018-0167
Coy Hile
coy.hile at coyhile.com
Mon Jun 4 13:26:47 EDT 2018
> On Jun 4, 2018, at 13:18, Sebastian Beutel <sebastian.beutel at rus.uni-stuttgart.de> wrote:
>
> Hi Antoine,
>
>> On Mon, Jun 04, 2018 at 05:23:58PM +0200, Antoine Monnier wrote:
>> Usually IP phones can also learn their voice vlan through a specific DHCP
>> option in the data VLAN - they then reboot inside the voice vlan to get
>> their final IP. Might be an option?
>>
> Maybe that's a dumb question but how do they reach their dhcp server if they
> do not know the vlan yet where it resides?
>
> Best,
> Sebastian.
>
Helper addresses configured on the switch configures where such requests should be forwarded.
>> On Mon, Jun 4, 2018 at 11:54 AM, Sebastian Beutel <
>> sebastian.beutel at rus.uni-stuttgart.de> wrote:
>>
>>> Hi Brian,
>>>
>>>> On Thu, May 31, 2018 at 07:03:23PM +0200, Brian Turnbow wrote:
>>>>
>>>> We don't use lldp, but you can turn it off on an interface by interface
>>>> bassis.
>>>>
>>> We need lldp because our ip phones learn their voice vlan via lldp. We
>>> can't
>>> define dedicated phone ports because people are used to plug in their phone
>>> wherever they choose to.
>>>
>>>>
>>>> Why run it on ports with devices outside of your control?
>>>>
>>> We didn't choose so. Universities had byod long before it had a name...
>>>
>>> Best,
>>> Sebastian.
>>>
>>>>
>>>>> -----Original Message-----
>>>>> From: cisco-nsp [mailto:cisco-nsp-bounces at puck.nether.net] On Behalf
>>> Of
>>>>> Sebastian Beutel
>>>>> Sent: mercoledì 30 maggio 2018 17:52
>>>>> To: cisco-nsp at puck.nether.net
>>>>> Subject: [c-nsp] 3750 and CVE-2018-0167
>>>>>
>>>>> Dear list,
>>>>>
>>>>> we're still having some Cat 3750 in operation and it will still
>>> take
>>>> some time
>>>>> till we can retire the last ones. We've asked Cisco whether they are
>>>> planning
>>>>> to publish a new software image for this platform that fixes
>>>>> CVE-2018-0167 despite the fact that the product is way beyond end of
>>>>> security and vulnerability support.
>>>>> Our Cisco representative stated that they are not planning to do so
>>>> despite
>>>>> the severity of the bug. He also said we're the only customer having
>>>> this issue.
>>>>> So my question is: If you're still running 3750s, how do you deal with
>>>> this?
>>>>>
>>>>> Best,
>>>>> Sebastian.
>>>>>
>>>>> P.S.: Cisco's advisory:
>>>>>
>>>> https://tools.cisco.com/security/center/content/
>>> CiscoSecurityAdvisory/cisco-sa-20180328-lldp
>>>
>>> _______________________________________________
>>> cisco-nsp mailing list cisco-nsp at puck.nether.net
>>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>>
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
More information about the cisco-nsp
mailing list