[59745] in North American Network Operators' Group
RE: Patching for Cisco vulnerability
daemon@ATHENA.MIT.EDU (Bob German)
Fri Jul 18 14:57:12 2003
From: "Bob German" <bobgerman@irides.com>
To: <nanog@merit.edu>
Date: Fri, 18 Jul 2003 14:56:28 -0400
In-Reply-To: <93C5326FCFEA7241BB6731D44D4147BC3586FF@bgslc11.burtongroup.com>
Errors-To: owner-nanog-outgoing@merit.edu
I don't see a lot of choice with this exploit. It's easy and quick. I
knocked down a 7206 in less than a minute. Expedite where you can.
BobG
-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of
Irwin Lazar
Sent: Friday, July 18, 2003 2:30 PM
To: nanog@merit.edu
Subject: Patching for Cisco vulnerability
Just out of curiosity, are folks just applying the Cisco patch or do you
go through some sort of testing/validation process to ensure that the
patch doesn't cause any other problems? Given typical change management
procedures how long is taking you to get clearance to apply the patch?
I'm trying here to gauge the length of time before this vulnerability is
closed out.
irwin