[106896] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: WebEx

daemon@ATHENA.MIT.EDU (Jon Kibler)
Fri Aug 15 12:17:23 2008

Date: Fri, 15 Aug 2008 12:17:08 -0400
From: Jon Kibler <Jon.Kibler@aset.com>
To: Jon.Kibler@aset.com
In-Reply-To: <48A58AE7.9000905@aset.com>
Cc: nanog@nanog.org
Reply-To: Jon.Kibler@aset.com
Errors-To: nanog-bounces@nanog.org

This is a multi-part message in MIME format...

------------=_1218817034-5749-815
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Jon Kibler wrote:
> BTW, despite the fact that Cisco says exploits are available, there is
> not the first mention of this vulnerability on the WebEx web site.

I really hate to reply to my own postings, but in this case I will make
an exception.

I just got an email from a Cisco PSIRT manager who said that they were
working with WebEx to address the issue that WebEx does not have an
announcement of the vulnerability on its web site, and Cisco will try to
ensure a similar omission does not happen again.

I am glad to see that Cisco is headed on the right track!

Jon
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224

My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkilrAQACgkQUVxQRc85QlPyAACdFx63Q4MaOpKYBch8SqiS9ToD
jQIAniwFX/qsbWMvzdTuZxfn0IWVdWge
=0mWf
-----END PGP SIGNATURE-----




==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.


------------=_1218817034-5749-815--


home help back first fref pref prev next nref lref last post