Wired Interviews Mike Lynn 194
ndansmith writes "Wired has got an interview with Mike Lynn, who revealed a major vulnerability in Cisco IOS at Black Hat 2005 in Las Vegas, and who has subsequently become the subject of an FBI investigation. A quote from Mike Lynn: 'Cisco said, "You guys are lying. It is impossible to execute shell code on Cisco IOS." At that point (ISS) management was annoyed.... They were like, "Mike, your new research project is Cisco IOS. Go find out how to exploit bugs on Cisco IOS so we can prove these people wrong."'"
u want an award? (Score:1)
there has been a pizza van outside my house for weeks.. no wait its a flower delivery van now.. wait now the telephone repair man.
Pink Golfball (Score:1)
*hands over tinfoil hat*
Seriously, though. If a company goes to the FBI and says "We think so and so has broken a law." they are supposed to look into it if a crime could have plausably been comitted. Kinda like calling the cops and reporting 'suspicious' activity. Its nearly always harmless.
Cisco is using this to try to shut him up, but its not the FBIs fault.
10:1 acouple weeks from now
Re:Pink Golfball (Score:2)
Where's the Google mention? (Score:1)
Re:Where's the Google mention? (Score:1)
Re:Where's the Google mention? (Score:1)
I think there were 10 to 100 topics on
Re:Where's the Google mention? (Score:1)
Re:Where's the Google mention? (Score:1)
Re:Where's the Google mention? (Score:2)
(is that better?)
Old news (Score:1)
Re:Old news (Score:2)
Re:Old news (Score:2)
Re:What the? (Score:2)
Finding vulnerabilities != being a criminal (Score:3, Insightful)
Re:Finding vulnerabilities != being a criminal (Score:1)
You can call this the Integer Effect.
Re:Finding vulnerabilities != being a criminal (Score:1)
Re:Finding vulnerabilities != being a criminal (Score:2)
Whay haven't you been posting here longer?
Re:Finding vulnerabilities != being a criminal (Score:1)
Fact of the matter is, if you notify the bank, and they say "well who cares, nobody else will notice", it's your OBLIGATION as an upstanding citizen to let everyone else who does business at that bank know that they have faulty locks and are knowingly not fixing the problem.
I'll refer to my pinto example yet again. The people who informed the general public that the pinto would explode when rear-ended weren't breaking the law be
Re:Finding vulnerabilities != being a criminal (Score:1)
Inform the company
If ignored inform BugTrap so System admin can take precautions to lock down the defect.
In the case of a broken bank lock
Inform Bank if bank ignores you
Tell the news media.
In todays world however telling the bank the valt door is broken will earn you an FBI investigation and informing the news media could get you arrested.
And it always appears to go this way:
The company is informed of the defect and the company clames it's a nonissue (eather saying 'Impossable' or 'it can do no h
Re:Finding vulnerabilities != being a criminal (Score:1)
They already have.
Look at McDonalds for example - their food is so drenched in oil and sugar and all those things that would cause obesity, diabetes, heart attack, stroke, etc... but they don't really try to do better. Their Chicken salad has the same caloric value as a Big Mac, and their yogurt parfait with Granolas is
Re:Finding vulnerabilities != being a criminal (Score:2)
to attack a software/firmware vulnerability
you are not reducing the risk of using that
product unless someone can stop using that
product without impacting their business
negatively.
In quite a few cases this results in the problem being fixed by the producer. Result is that the risk is in fact reduced.
And of course if you have
a vested interest in them not using it,
or using something else then there is another
even more serious issue there -- can you
see the potential problem
Re:Finding vulnerabilities != being a criminal (Score:2)
So unless you know of a way to confidentially tell every single user of the router that there's a hugely bad security flaw in their router and that the company has lied
Re:Finding vulnerabilities != being a criminal (Score:2)
Re:Finding vulnerabilities != being a criminal (Score:1)
Re:/.'ers don't understand the nature of power (Score:1)
...and that's how you get Capone!
Re:/.'ers don't understand the nature of power (Score:2)
As Jenny Holzer said, "Deviants are sacrificed to increase group solidarity."
Re:/.'ers don't understand the nature of power (Score:2)
Any patches from Cisco? (Score:2)
Juniper is looking better all the time.
Re:Any patches from Cisco? (Score:2)
Re:Any patches from Cisco? (Score:1)
Re:Any patches from Cisco? (Score:2)
I've never understood the desire to make a company public. Its tantamount to placing the decisions in the hands of people who may not have any vested interest in success tommorow if they pull their money out. Its terribly short sighted and only makes sense VERY simple industries.
Re:Any patches from Cisco? (Score:2)
One priority: Money is all that matters.
Re:Any patches from Cisco? (Score:2)
The big-time financiers like the underwriters(who are get to underwrite them for their IPO) and the central-bankers like this law of course. Nice insurance too because you wouldn't want private individuals who
Re:Any patches from Cisco? (Score:2)
Perhaps they complied with the law but decided in spite of it still stayed private?
It is Section XII(g) of the Securities and Exchange Act of 1934. Linky. [uc.edu]
Good ol' "Interstate Commerce"-related laws.
I don't think I used the word "open" so I didn't really mean anything "by 'open'" because...I didn't use "open." It's the same thing that convinced Google(ooo, on topic) to make an IPO. Here's a qu
Re:Any patches from Cisco? (Score:2)
Re:Any patches from Cisco? (Score:2)
NANOG people definitely stirred up (Score:2)
This kind of turned into a worst-case PR situation for Cisco -- they screwed up on their product, they tried to cover it up, and then they hassled the guy that released the information.
"They were like," (Score:2)
How about we cut the teen speak?
Re:"They were like," (Score:1)
Re:"They were like," (Score:2)
Re: (Score:2)
I don't know about the Cisco thing, but... (Score:2)
Re:I don't know about the Cisco thing, but... (Score:2)
These days (and I don't really care, either) it seems like Lynn and his collection of co-investors were brilliant compared to the used car salesmen and other tinpot business "moguls" running the show.
now prose (Score:2)
Like, not only speech, but even our writing has like sunk to the level of the California valley girl, like.
Re:now prose (Score:2)
Meanwhile, there are plenty of incorrect usages in English that I refuse to adopt on the basis of their absurdity:
Some time ago, I found a site dedicated to common errors in English [wsu.edu]
reverse engineering. (Score:1)
Re:reverse engineering. (Score:1)
Re:reverse engineering. (Score:1)
WhiteHat> Err, you guys have a problem...
Cisco> No we don't.
WhiteHat> No really, it's there. I can prove it.
Cisco> Ohh, so you violated the DMCA to hack us, huh? Well that is ILLEGAL mr. security guru. We're calling our lawyers.
* WhiteHat scratches his head. *
WhiteHat> Err, guys? If I didn't tell you about it, BlackHat would find out, keep it a secret and exploit it on every device he could. Wouldn't you rather know so you can fix it and prevent wid
Re:reverse engineering. (Score:2)
Not only that... (Score:1)
Vikings (Score:2)
Hey, but at least you guys went to the Super Bowl in 98...oh wait. No. You got beat by the Falcons.
(Nelson voice:)Ha ha!
Mike is going to find out the hard way... (Score:1)
Re:Mike is going to find out the hard way... (Score:2)
Not only that, she's been a whore to anyone with a wad of cash for decades now.
Patch Info (Score:1)
But this particular bug may not be the real news. The real news is running shell code on Cisco via an exploit. Or as Cisco puts it "Upon successful exploitation, the device may reload or be open to further exploitation." If this technique is not tied to this specific exploit but to architectural problems in IOS, Cisco worms could become a problem.
Given that Cisco had source code stolen [arstechnica.com], there is almost no limit to what a worm could do. Spyware on
Offtopic: Moderation anomoly? (Score:3, Funny)
---
funny commercials [tubespot.com]
Re:Offtopic: Moderation anomoly? (Score:2)
Something amiss with the duration of mod points? (Score:2)
Re:Something amiss with the duration of mod points (Score:2)
More on topic -- the funny thing about Cisco's role in all this is that I tend to trust companies that come forward and speak out forcefully in admitting a problem with a product. It makes me confident that they will fix it and fix it right.
By going after the guy that dared discuss the problem I've lost trust in Cisco. If they didn't want this discussed it makes me wonder if they might have a b
Re:Offtopic: Moderation anomoly? (Score:1)
MOD PARENT UP (Score:3, Funny)
MOD PARENT DOWN (Score:2)
Re:Offtopic: Moderation anomoly? (Score:2)
Slashdot is dying.
(sorry)
Re:Offtopic: Moderation anomoly? (Score:1, Offtopic)
There's a couple of moderations up, but I don't see any downmods. We might be able to say anything we want without fear of being modded down!
Lets test this:
Re:Offtopic: Moderation anomoly? (Score:2)
This is possibly an indication that my hypothesis has failed to soldify into a viable theory.
Re:Offtopic: Moderation anomoly? (Score:2)
Re:Offtopic: Moderation anomoly? (Score:2)
Of course, that might mean nothing at all.
I think the reason nobody's above 3 is that hardly anybody has mod points. Just from poking around, I'd say it looks like it's maybe one person.
Re:Offtopic: Moderation anomoly? (Score:1)
Re:Offtopic: Moderation anomoly? (Score:1)
The FBI is investigating... (Score:2)
Good read (Score:1)
Video (Score:1)
Let's at least get close to reality here... (Score:3, Insightful)
What he did was prove that existing and future vulnerabilities in IOS _could_ be exploited to run shellcode, while it was previously thought that a DoS was the 'best' a hacker could do to an IOS box. He used a 4-5 month old (patched) vulnerability to demonstrate this...
The presentation and other docs are everywhere. (Score:1)
If you understand both IOS and assembler pcode, you can catch his drift. These are chinks in the otherwise solid armor that Cisco has.
The exposure of this, along with other security bugs that organizations have, ranging from Microsoft down to Linus's best code, are important to know at the second of apparency. That's when both the good guys and the bad guys can get to work. I hope the bad guys lose, and they usually do. But prevention of exposure is
Ok...first of all. (Score:1)
1) There was no known way to execute shellcode due to the idle process responsible for doing heap pointer 'validation'. Thnsis prevented the possibility of executing shell code and essentially limited the attack vectors for overflows to DoS.
2) Some level of obscurity regarding the IOS inner workings.
Is that what you consider solid armour?
While Lynns presentation was mostly old news, it did something very important. It eliminated point #1 ab
Re:Ok...first of all. (Score:2)
No argument about it being way more usefull to get full control over a router, but being able to DOS it is quite usefull to a hacker, esp. when there happen to be some nameservers behind the router for example
Well written and well spoken. (Score:1)
Honestly He's the kind of Admin I respect, rather then play ball only with the corporation, he lets everyone know the problem so everyone can handle the situation. He claims there was a fix out in six monthes ago for his bug? I don't see why Cisco
Well, Mike's a lot more than an admin... (Score:3, Interesting)
Re:Well, Mike's a lot more than an admin... (Score:2)
Similar to it with some more advanced stuff... (Score:2)
cisco's response is amusing (Score:1)
From the sidelines it is quite entertaining.
Take care getting Cisco patches - compromised! (Score:3, Interesting)
Let the authentication fail and read the following:
IMPORTANT NOTICE:
Intentions/methods notwithstanding (Score:3, Insightful)
If [cC]isco adopts the spinout method of handling vulnerabilities, or if that mentality takes hold within their corporate culture, the impact on the internet will without question be swift and negative. True, they'll get also get swiftly eclipsed by competitors, but in the meantime there would be Internet-wide trouble.
Re:Federal Buraeu of Investigation investigation? (Score:1)
It's a utopia! (Score:1)
Microsoft is good!
Linux is the debil!
Cats and Dogs living together!
MASS HYSTERIA!
Re:It's a utopia! (Score:1)
Re:It's a utopia! (Score:1)
IANAL, but as I have read elsewhere, the DMCA [harvard.edu] allows reverse engineering if the reverse engineer seeks permission from the copyright owner, only uses the results of their efforts to create an interoperable computer program and does not publish the results.
Re:slashdot mod system (Score:1)
Get your forbidden fruit here (Score:3, Informative)
You can get your copy lynne-cisco.zip [cryptome.org] from cryptome.org.
Re:Get your forbidden fruit here (Score:2)
559942447c88086fa1304c38f9d0242c lynn-cisco.pdf
I wonder if someone has posted a copy on Freenet (it'd be a good use of it).
Re:Get your forbidden fruit here (Score:2)
Re:Cisco is acting poorly (Score:2)
So much for keeping it secret ...
Ooo... Seems that the black hats... (Score:2)
It's probably a good thing that Mike did what he did- the ability to run arbitrary code on a Cisco box is far more serious than Cisco's spinning it.
Re:As a former ISS employee... (Score:1)
Cisco is a large company. They obviously didn't know the extent of the problem until it was demonstated to them. It was irresponsible for Mike to go ahead with his talk without allowing Cisco time to reassess the threat. Put yourself in Cisco's shoes: someone points out a vulnerability, they tell you about it, you spend 6 months fixing a zillion IOS ima
Re:As a former ISS employee... (Score:2)
I think that the issue was more Cisco refusing to accep that the vulnerability was way serious, and tried to downplay it.
You would be right if Cisco would have been listening from the start.
Why Cisco's response isn't acceptable (Score:1)
Well, I wouldn't necessarily commit to 'obviously', but yes, it is possible that they did not understand the extent of the problem.
One problem many advocates of open source have with how large companies deal with security issues is that the company in question wishes to reserve -all rights- to evaluating the severity and proper response to security issues to their own management. As most co
Re:As a former ISS employee... (Score:1)
Re:As a former ISS employee... (Score:2)
Add to that - Mike got a go
Re:Why bother (Score:2)
P.S. Slashdot is definitely broken. Not that that ever stopped anyone.
WHAT?! (Score:1)
Re:Two things that make this interesting... (Score:1)