[51910] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: VU#210321

daemon@ATHENA.MIT.EDU (CERT(R) Coordination Center)
Tue Sep 10 11:02:02 2002

From: "CERT(R) Coordination Center" <cert@cert.org>
Reply-To: "CERT(R) Coordination Center" <cert@cert.org>
Date: Tue, 10 Sep 2002 10:53:07 -0400 .
To: "Derek Samford" <dsamford@fastduck.net>
Cc: "CERT(R) Coordination Center" <cert@cert.org>, nanog@merit.edu
In-Reply-To: <000101c258d7$7031a5b0$5201a8c0@server> from Derek Samford on
    Tue, 10 Sep 2002 10:36:24 -0400
Errors-To: owner-nanog-outgoing@merit.edu


-----BEGIN PGP SIGNED MESSAGE-----

Hi, Derek.

>So right now this is a scary rumor floating around the security
>scene? 

Right. Rumors for now...

>Is there any particular trace, or any further details your aware
>of? 

Not at this time.

>Also, I think it Amay be safe to assume the Mac OS X/Jaguar may be
>vulnerable as well. AFAIK it runs of the BSD IP Stack, so it's more than
>likely that it is vulnerable if this exploit is in fact a reality. I'll
>keep an eye out for any suspicious traffic myself, as I'm sure will the
>rest of the list. 

Thank you, we really appreciate it.

>Thanks for the warning, as if this is real, it could
>be be potentially very harmful. Any great C Coders out there start
>pouring over the code yet?

Glad to be of help. I really appreciate the feedback we get from the
NANOG community.

Thanks again,
Ian

Ian A. Finlay
CERT (R) Coordination Center		
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA  USA  15213-3890




-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBPX4I9aCVPMXQI2HJAQFabAQAnwkyxn2LZJ0VOv3L7RT5jwzGEy0pRL7A
FRE920tu4ys8fuaoweFp1YaiUUlVPFuoPFgFWlsHJ7uUkUVcL0T6Kzm5bzp8C5hz
QYdYjuumEj1thy/zxzzAJIsJqiLcXG0rW0iAlpaQ0X30JqH13OEHVr4Wuev0a2Pi
efDOLkEzliQ=
=dZDX
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post