[82741] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco cover up

daemon@ATHENA.MIT.EDU (Stephen Sprunk)
Thu Jul 28 15:46:39 2005

From: "Stephen Sprunk" <stephen@sprunk.org>
To: "Mikael Abrahamsson" <swmike@swm.pp.se>
Cc: <nanog@nanog.org>
Date: Thu, 28 Jul 2005 13:43:31 -0500
Errors-To: owner-nanog@merit.edu


Thus spake "Mikael Abrahamsson" <swmike@swm.pp.se>
> On Thu, 28 Jul 2005, Mark Owen wrote:
>
>> Cisco had the exploit fixed in April and no longer offers the exploitable 
>> OS for download on their site.
>
> And the list of vulnerable IOS versions is where....?
>
> I don't care exactly what the exploit is but I want to know the risks 
> involved and what versions are vulnerable. Any workarounds available
> would be nice as well, the fewer routers potentially needing immediate
> upgrade to fixed IOS the better.

The short answer is, if an image is still on CCO, it's not vulnerable.  That 
applies to both this problem and any other security problems Cisco has 
patched but not published notices for yet.

S

Stephen Sprunk      "Those people who think they know everything
CCIE #3723         are a great annoyance to those of us who do."
K5SSS                                             --Isaac Asimov 


home help back first fref pref prev next nref lref last post