Oct
26
2009
Cisco to acquire Starent Networks

On 13 October 2009, Cisco and Starent Networks announced a definitive agreement for Cisco to acquire Starent Networks. Starent Networks is a leading supplier of IP-based mobile infrastructure solutions targeting mobile and converged carriers. The Mobile Internet is at an inflection point as IP-enabled Smartphones and other connected mobile devices gain rapid acceptance. Service Providers have been actively investing in this market as global mobile data traffic is expected to more than double every year through 2013, according to the Cisco Visual Networking Index. Under the terms of the agreement, Cisco will pay $35 per share in cash in exchange for each […]

Oct
20
2009
Cisco Unified Presence Denial of Service Vulnerabilities

On Octobert 14, 2009, the The Cisco Product Security Incident Response Team (PSIRT) has published one important vulnerability advisories: Cisco Unified Presence Denial of Service Vulnerabilities. Cisco Unified Presence contains two denial of service (DoS) vulnerabilities that may cause an interruption to presence services. These vulnerabilities were discovered internally by Cisco, and there are no workarounds. Vulnerable Products The following products are affected: Cisco Unified Presence 1.x versions Cisco Unified Presence 6.x versions prior to 6.0(6) Cisco Unified Presence 7.x versions prior to 7.0(4)

Oct
3
2009
Cisco to acquire Tandberg

On 1st October 2009, Cisco announced a definitive agreement for Cisco to launch a recommended voluntary cash offer to acquire TANDBERG (OSLO: TAA.OL).  TANDBERG, based in Oslo, Norway, and New York, is a global leader in video communications, including a broad range of world-class video endpoint and network infrastructure solutions with intercompany and multi-vendor interoperability. With this proposed acquisition, Cisco will expand its collaboration portfolio to offer more solutions to a greater number of customers, further accelerating market adoption globally.

Sep
25
2009
Sep.23, 2009: 11 new Cisco critical vulnerabilities!!

On September 23, 2009, the The Cisco Product Security Incident Response Team (PSIRT) has published 11 important vulnerability advisories. Cisco Unified Communications Manager Express Vulnerability Cisco IOS® devices that are configured for Cisco Unified Communications Manager Express (CME) and the Extension Mobility feature are vulnerable to a buffer overflow vulnerability. Successful exploitation of this vulnerability may result in the execution of arbitrary code or a Denial of Service (DoS) condition on an affected device.

Sep
18
2009
TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products

On September 8, 2009, the The Cisco Product Security Incident Response Team (PSIRT) has published one important vulnerability advisories: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products. Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from […]

Sep
9
2009
How to create shortcut command

Cisco IOS permits to define a shortcut to complex command. An alias can be configured to do anything that can be done at the command line, but an alias cannot move between modes, type in passwords, or perform any interactive functions. To create a command alias, issue the alias command in global configuration mode. The syntax of the command is alias mode command-alias original-command. Who have never typed repeatedly the commands show cdp neigh or show ip inter brief?

Aug
30
2009
Aug.30, 2009: 3 new Cisco critical vulnerabilities

In the last 2 weeks, three new security advisory has been published by PSIRT: Cisco IOS XR Software Border Gateway Protocol Vulnerabilities, Cisco Unified Communications Manager Denial of Service Vulnerabilities and Firewall Services Module Crafted ICMP Message Vulnerability. 1) Cisco IOS XR Software Border Gateway Protocol Vulnerabilities Cisco IOS XR Software contains multiple vulnerabilities in the Border Gateway Protocol (BGP) feature.

Aug
13
2009
Jul.29, 2009: 2 new Cisco critical vulnerabilities

On July 29, 2009, the The Cisco Product Security Incident Response Team (PSIRT) has published 2 new vulnerability advisories. 1) Active Template Library (ATL) Vulnerability Certain Cisco products that use Microsoft Active Template Libraries (ATL) and headers may be vulnerable to remote code execution. In some instances, the vulnerability may be exploited against Microsoft Internet Explorer to perform kill bit bypass. In order to exploit this vulnerability, an attacker must convince a user to visit a malicious web site.

Jul
31
2009
Black Hat USA 2009: Router Exploitation

During the Black Hat USA 2009, Felix “FX” Lindner has presented his researches concerning the exploitation of memory corruption software vulnerabilitiesin Cisco IOS. “The goal is to map out the problem space in order to allow for the anticipation of developments in the future, as current research suggests that exploitation of such vulnerabilities in the wild is not currently the case. By understanding the challenges that an attacker faces, defensive strategies can be better planned, a required evolution with the current state of Cisco IOS router networks.” says Felix ‘FX’ Lindner in his “Cisco IOS Router Exploitation” abstract.

Jul
30
2009
Cisco 2009 Midyear Security Report

The Cisco 2009 Midyear Security Report presents an overview of Cisco security intelligence, highlighting threat information and trends from the first half of 2009. The report also includes recommendations from Cisco security experts and predictions of how identified trends will evolve. As predicted in the Cisco 2008 Annual Security Report, attacks are only becoming more sophisticated and targeted as we move through 2009—and the global recession. However, while cybercrime is more pervasive, there are encouraging signs that increased collaboration among the “good guys” is making it more difficult for attacks to take root and grow.

Pages:«1...14151617181920...27»