[59745] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Patching for Cisco vulnerability

daemon@ATHENA.MIT.EDU (Bob German)
Fri Jul 18 14:57:12 2003

From: "Bob German" <bobgerman@irides.com>
To: <nanog@merit.edu>
Date: Fri, 18 Jul 2003 14:56:28 -0400
In-Reply-To: <93C5326FCFEA7241BB6731D44D4147BC3586FF@bgslc11.burtongroup.com>
Errors-To: owner-nanog-outgoing@merit.edu



I don't see a lot of choice with this exploit.  It's easy and quick.  I
knocked down a 7206 in less than a minute.  Expedite where you can.

BobG
 


-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of
Irwin Lazar
Sent: Friday, July 18, 2003 2:30 PM
To: nanog@merit.edu
Subject: Patching for Cisco vulnerability



Just out of curiosity, are folks just applying the Cisco patch or do you
go through some sort of testing/validation process to ensure that the
patch doesn't cause any other problems?  Given typical change management
procedures how long is taking you to get clearance to apply the patch?

I'm trying here to gauge the length of time before this vulnerability is
closed out.

irwin


home help back first fref pref prev next nref lref last post