[170520] in North American Network Operators' Group
Re: Cisco Security Advisory
daemon@ATHENA.MIT.EDU (Scott Weeks)
Fri Mar 28 16:12:03 2014
Date: Fri, 28 Mar 2014 13:11:36 -0700
From: "Scott Weeks" <surfer@mauigateway.com>
To: <nanog@nanog.org>
Reply-To: surfer@mauigateway.com
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 3/27/2014 7:44 PM, Alexander Neilson wrote:
> I wonder if they should be invited to only post a single message with
> the titles and links to the alerts so that people can follow it up.
----------------------------------------------------------
If a person is on multiple of *NOG mailing lists a lot of these're
received. For example, I got well over 30 of them this round. It'd be
nice to get something brief like this:
----------------------------------------------
The Semiannual Cisco IOS Software Security Advisory has been released.
For information please goto this URL:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
Advisory titles:
- Session Initiation Protocol Denial of Service Vulnerability
- Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks Denial of Service Vulnerability
- Internet Key Exchange Version 2 Denial of Service Vulnerability
- Network Address Translation Vulnerabilities
- SSL VPN Denial of Service Vulnerability
- Crafted IPv6 Packet Denial of Service Vulnerability
-----------------------------------------------
Not everyone uses cisco and not everyone needs to see every vulnerability
detail email multiple times. Imagine if all vendors started doing what
cisco is doing.
:-(
scott