Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Cisco IOS Exploitation Techniques (

An anonymous reader writes: It's been almost two years since Michael Lynn demonstrated a reliable code execution exploit on Cisco IOS. Although his presentation received a lot of media coverage in the security community, very little is known about the attack and the technical details surrounding the IOS check_heaps() vulnerability. This paper is a result of research carried out by IRM to analyse and understand the check_heaps() attack and its impact on similar embedded devices. Furthermore, it also helps developers understand security-specific issues in embedded environments and developing mitigation strategies for similar vulnerabilities.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Cisco IOS Exploitation Techniques

Comments Filter:

Optimization hinders evolution.