Holy Grail

Purpose for posting it was, after reading it, there is not enough in my
opinion to warrant a nuclear lock down on this information. I did this to
sort of prove a point to those in the industry: "Stop letting vendors sell
you short." As an engineer they've (Cisco) shortchanged clients using
their equipment. If it's IPv6 based only, and not that big of a threat,
then they should see no problem with the information being released.

Before anyone decides to send in legal hounds, take note this is
searchable via Google... 5 minutes tops with over 100+ sites listing the
PDF. Sorry Cisco.

Saying that this is IPv6 only is misleading. The point of Mike's talk
was to show that buffer overflows do more than DOS or reset a Cisco box,
but they can actually be exploited like most things we learn about every
Patch Tuesday.

In the example he used in the talk, he showed off an exploit that took
advantage of a buffer overflow in the IPv6 code, but patching that one
bug does not mean you'll never see this type of exploit again.

Yes, any vendor big or small should realize that if they try to hide
things instead of fixing them and owning up, it's just a matter of time
until we find it for ourselves, and maybe next time the researcher will
be a black hat, also playing secret like Cisco.

Imagine the PR bruise that will cause.


The specific exploit was IPv6 only. The concept that IOS is a sane operating
system, and that given a vulnerability, you just need to do X and Y and Z in a
fairly mechanical fashion to make a full blown exploit, is IOS-only.

Cisco is just busy having the same cow that everybody else had on the x86
platform when Solar Designer wrote "Smashing the Stack for fun and profit",
because this is basically "Smashing the IOS stack for fun and profit"....

Wasn't that Aleph1?

It was so long ago that history became legend, and legend became myth, and Cisco is
just now catching up.. :wink: