Summary
It was possible to poison the remote host routing tables through the RIP protocol.
An attacker may use this to hijack network connections.
Solution
use RIP-2 and implement authentication,
or use another routing protocol,
or disable the RIP listener if you don't need it.
Severity
Classification
-
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Adobe Flash Player Arbitrary Code Execution Vulnerability - 01 Feb14 (Windows)
- Adobe AIR Multiple Vulnerabilities -01 Feb13 (Mac OS X)
- Adobe Extension Manager CS5 Insecure Library Loading Vulnerability (Win)
- Adobe Air Multiple Vulnerabilities -01 August 12 (Mac OS X)
- Adobe Acrobat Multiple Vulnerabilities-01 Sep14 (Windows)