[22695] in bugtraq

home help back first fref pref prev next nref lref last post

UPDATE - Cisco Security Advisory: Multiple SSH vulnerabilities

daemon@ATHENA.MIT.EDU (Cisco Systems Product Security Inc)
Thu Sep 20 18:00:48 2001

Date: Thu, 20 Sep 2001 20:03:04 +0100 (BST)
Message-Id: <200109201903.f8KJ34922310@uk-cse-011.cisco.com>
To: bugtraq@securityfocus.com
From: Cisco Systems Product Security Incident Response Team <psirt@cisco.com>
Errors-To: nobody@cisco.com
Reply-To: Cisco Systems Product Security Incident Response Team <psirt@cisco.com>
Cc: psirt@cisco.com


-----BEGIN PGP SIGNED MESSAGE-----

Please note that updated version of "Cisco Security Advisory: 
Multiple SSH Vulnerabilities", available at
http://www.cisco.com/warp/public/707/SSH-multiple-pub.html 
was posted.

Cisco 11000 Content Service Switch family is also vulnerable to
all three vulnerabilities mentioned in the advisory. All WebNS 
releases prior, but excluding, versions: R4.01 B42s, R4.10 B22s, 
R5.0 B11s, R5.01 B6s, are vulnerable.

For all further information please consult the advisory available
at http://www.cisco.com/warp/public/707/SSH-multiple-pub.html


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>

iQEVAwUBO6o3qA/VLJ+budTTAQEXPgf/VnED4958EXTkqN7ME8N/+UbF7OA4sQ3e
AZL6Tb9APLepRbVBvILT1sWOOn5XiZ4KByGwfr+fve1/D8Zp8uDzS3RQkr0c2NFW
ybMNkWLobasA4WAdOFZShKCzs7/JX2GME8pbIeRwLaT25pPleKhzazGJNpqYc22/
8SetSKmzWiZt9soPaYSgIJFoYNcpsukeK7rFMsCDr8h6fR+Hqjlf0nFcKtILRSat
5IqHgfdZHPCvyWzwg0FhD0yYEh5RpTuxkea4/k9WwnS9xeJyK5a7WA/EP01CuraV
jpDJL9USEz6gWWAaIUaIPmap+9kBO0YM5Fijkmb6yBZ376KKefr1Bg==
=OP/D
-----END PGP SIGNATURE-----


home help back first fref pref prev next nref lref last post