TUCoPS :: Cisco :: cisc5255.htm

Cisco Aironet DoS via telnet
11th Apr 2002 [SBWID-5255]
COMMAND

	Cisco Aironet DoS via telnet

SYSTEMS AFFECTED

	 All releases up to, but excluding, 11.21 are vulnerable. The following

	 hardware products are affected :

	

	   * Cisco Aironet Access Point 340 and 350

	   * Cisco Aironet Bridge 350

	

PROBLEM

	In Cisco advisory
	 [http://www.cisco.com/warp/public/707/Aironet-Telnet.shtml] :

	

	It is possible to cause Cisco  Aironet  products  to  reboot  if  Telnet
	access is enabled and a password is  required  for  authorization.  This
	can be accomplished by providing an invalid username and password.
	

	By repeatedly  exploiting  this  vulnerability  an  attacker  can  cause
	denial of service.

SOLUTION

	The workaround for this vulnerability is to disable Telnet access.
	

	This vulnerability is fixed in release 11.21, which is available now.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH