[69196] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New cisco exploit published in the media today

daemon@ATHENA.MIT.EDU (Bruce Pinsky)
Mon Mar 29 17:31:29 2004

Date: Mon, 29 Mar 2004 14:29:38 -0800
From: Bruce Pinsky <bep@whack.org>
Reply-To: bep@whack.org
To: Scott Call <scall@devolution.com>
Cc: nanog@merit.edu
In-Reply-To: <Pine.LNX.4.33L2.0403291420250.6994-100000@twomix.devolution.com>
Errors-To: owner-nanog-outgoing@merit.edu


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Scott Call wrote:
| Forgive the not panicing, but none of the exploits utilized by this tool
| are new, the newest being a year old, most being 2-3 years old, judging by
| the dates on the cisco pages.
|

Yes, but the toolkit and the simplicity with which these exploits can now
be executed IS new.  This notification serves as a reminder to those who
may not have addressed these vulnerabilities in their networks even where
there have been fixes for several years.

- --
=========
bep

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (MingW32)

iD8DBQFAaKNSE1XcgMgrtyYRAgWyAKCebXMbePjRFZVKMeUYpUYc6JE76QCfcEJa
PeZKPuual+8U1/90cFn7cUk=
=JU67
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post