[G3]-TechNews : Home| RSS | Atom | MSN | WAP

Article: Step-by-Step Guide: How to set up a VPN
Article: Download: Microsoft Monad (Beta)
Article: Building a 64-Bit Multimedia Workstation
Article: Coming Soon to Windows: The Microsoft Shell (MSH)
Article: How to Reset Win NT / 2000 / XP Administrator Password
Article: The Technology Behind Dual Core CPUs
Article: How-To: Wireless Network Security
Article: Article: PCI Express - technology backgrounder
Article: Tutorial: Access Hidden Files on Your iPod
Article: Troubleshooting drivers with XP's hidden Driver Verifier Manager
Article: How to Make a 5 in 1 Network Cable
Article: Comparison - Blu-ray & HD DVD
Article: Beginners Guides Linux : Part 1 | Part 2 | Part 3
Article: How To Crack WEP (Wired Equivalent Privacy)
Article: Email Addresses Spoofing.
Link: Free PHP ebook
Link: FREE ASP.NET books and eLearning course
Link: Free registration code for Opera 8.
Invitations: Gazzag (Here) | Yahoo! 360 (Here)  | Orkut (Here)

Latest Cisco VoIP-enabled routers vulnerability.
Contributed by: G3nu1n3, at 1/24/2005 06:20:00 PM.

Cisco Systems has warned that an IOS software glitch could leave VoIP-enabled routers vulnerable to attack.

The software flaw affects only Cisco routers running IOS Telephony Services, CallManager Express or Survivable Remote Site Telephony (SRST). These services use Cisco’s Skinny Call Control Protocol (SCCP, or Skinny), which controls signalling between Cisco IP telephones and CallManager call processors. The IOS bug could allow an attacker to send malformed packets to the Skinny port on a Cisco VoIP-enabled router.

“Successful exploitation of the vulnerability may result in a device reload,” according to an advisory on the Cisco website. “Repeated exploitation could result in a Denial of Service (DoS) attack.”

View: Cisco Advisory

To Read MOST UPDATED News Items browse to HOME page.


Post a Comment

<< Home

[G3]-TechNews : Home| RSS | Atom | MSN | WAP

Archives :

- Monthly Archives :

- Post Count: 1,783 before June 1, 2005. (Since: October 26, 2004)