Nifty DoS in Foundry networks gear.

From: Jan B. Koum (jkbat_private)
Date: Mon Aug 02 1999 - 16:58:43 PDT

  • Next message: Ben Greenbaum: "Vulnerabilities in BO2k encryption plugins"

    	Running tcp nmap scan against Foundry network gear make it go boom.
    What makes it more sad is that Foundry is in the networking business -- they
    route packets. They don't make toasters which get it's tcp/ip stack written by
    a recent CS grad. Anyway, the version I have which reboots after simple
    "nmap <host>" is:
    
    telnetat_private#sh ver
     SW: Version 05.0.94T13 Copyright (c) 1996-1999 Foundry Networks, Inc.
         Compiled on Jun  8 1999 at 15:46:09 labeled as N8R05094
     HW: NetIron Gigabit Switching Router, serial number 01a5a4
     200 MHz Power PC processor 603 (revision 7) with 32756K bytes of DRAM
      16 100BaseT interfaces with Level 1 Transceiver LXT975
       2 GIGA uplink interfaces, SX
    [.. snip ..]
    
    Octal System, Maximum Code Image Size Supported: 1965568 (0x001dfe00)
    The system uptime is 1 minutes 47 seconds
    
    
    	This is NetIron series -- not sure about other hardware...
    
    	I notified Foundry two weeks ago -- but they do not seem to be able
    to reproduce the problem themself (I also wasn't able to crash a foundry on
    our LAN running  05.0.02T13  version of their software).
    
    
    -- Yan
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:54:53 PDT