[176934] in North American Network Operators' Group
Re: Ars breaks Misfortune Cookie vulnerability news to public
daemon@ATHENA.MIT.EDU (Javier J)
Fri Dec 19 18:50:02 2014
X-Original-To: nanog@nanog.org
In-Reply-To: <918173.514.1419029643163.JavaMail.root@benjamin.baylink.com>
Date: Fri, 19 Dec 2014 18:49:53 -0500
From: Javier J <javier@advancedmachines.us>
To: Jay Ashworth <jra@baylink.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
Glad I'm using a freebsd based routing solution.
On Dec 19, 2014 5:54 PM, "Jay Ashworth" <jra@baylink.com> wrote:
> While the flaw is 12 years old and the fix 9, the article suggests that
> firmware for consumer routers may yet be being built with the vulnerable
> webserver code baked in.
>
> If you are responsible for lots of eyeballs you might want to look at this.
>
>
> http://arstechnica.com/security/2014/12/12-million-home-and-business-routers-vulnerable-to-critical-hijacking-hack/
>
> Have a nice Christmas weekend. :-)
>
> Cheers,
> -- jra
>
> --
> Jay R. Ashworth Baylink
> jra@baylink.com
> Designer The Things I Think RFC
> 2100
> Ashworth & Associates http://www.bcp38.info 2000 Land
> Rover DII
> St Petersburg FL USA BCP38: Ask For It By Name! +1 727 647
> 1274
>