[176934] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Ars breaks Misfortune Cookie vulnerability news to public

daemon@ATHENA.MIT.EDU (Javier J)
Fri Dec 19 18:50:02 2014

X-Original-To: nanog@nanog.org
In-Reply-To: <918173.514.1419029643163.JavaMail.root@benjamin.baylink.com>
Date: Fri, 19 Dec 2014 18:49:53 -0500
From: Javier J <javier@advancedmachines.us>
To: Jay Ashworth <jra@baylink.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

Glad I'm using a freebsd based routing solution.
On Dec 19, 2014 5:54 PM, "Jay Ashworth" <jra@baylink.com> wrote:

> While the flaw is 12 years old and the fix 9, the article suggests that
> firmware for consumer routers may yet be being built with the vulnerable
> webserver code baked in.
>
> If you are responsible for lots of eyeballs you might want to look at this.
>
>
> http://arstechnica.com/security/2014/12/12-million-home-and-business-routers-vulnerable-to-critical-hijacking-hack/
>
> Have a nice Christmas weekend.  :-)
>
> Cheers,
> -- jra
>
> --
> Jay R. Ashworth                  Baylink
> jra@baylink.com
> Designer                     The Things I Think                       RFC
> 2100
> Ashworth & Associates       http://www.bcp38.info          2000 Land
> Rover DII
> St Petersburg FL USA      BCP38: Ask For It By Name!           +1 727 647
> 1274
>

home help back first fref pref prev next nref lref last post