[176939] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Ars breaks Misfortune Cookie vulnerability news to public

daemon@ATHENA.MIT.EDU (Javier J)
Fri Dec 19 23:28:38 2014

X-Original-To: nanog@nanog.org
In-Reply-To: <20141220010115.GA5744@excession.tpb.net>
Date: Fri, 19 Dec 2014 23:28:30 -0500
From: Javier J <javier@advancedmachines.us>
To: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

Haha, yeah I spoke too soon.

Happy Holidays.

Also has anyone looked at the list of devices / vendors that are using that
software?

https://www.allegrosoft.com/about-allegro-software#tabs-896-0-4

Did the vendors know their vendor was giving them buggy software?

What is the test for this vuln?

On Fri, Dec 19, 2014 at 8:01 PM, Niels Bakker <niels=nanog@bakker.net>
wrote:

> * javier@advancedmachines.us (Javier J) [Sat 20 Dec 2014, 00:50 CET]:
>
>> Glad I'm using a freebsd based routing solution.
>>
>
> Time to update that one too: https://ics-cert.us-cert.gov/
> advisories/ICSA-14-353-01
>
>
>         -- Niels.
>

home help back first fref pref prev next nref lref last post