RIP poisoning

Summary
It was possible to poison the remote host routing tables through the RIP protocol. An attacker may use this to hijack network connections.
Solution
use RIP-2 and implement authentication, or use another routing protocol, or disable the RIP listener if you don't need it.