Howdy,

I'm reviewing this vulnerability for IOS:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte

In the advisory it doesn't seem to mention whether the code execution happens 
pre or post the application of the ACL?

Consider this example:

snmp-server community YourVerySecureCommunityString RO 60

I assume that the ACL blocking access to hosts other than the NMS would be 
enough to prevent this from being super widely exploitable but its IOS so I am 
thinking in IOS terms.

Anyone have any details on that?

Thanks,
-Drew




_______________________________________________
cisco-nsp mailing list  [email protected]
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Reply via email to