[17989] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Cisco Security Advisory: Multiple Vulnerabilities in CBOS

daemon@ATHENA.MIT.EDU (Gary Barnett)
Sun Dec 10 17:43:17 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Message-Id:  <sa30bd01.021@mail.wsrgm.com>
Date:         Fri, 8 Dec 2000 10:50:32 -0800
Reply-To: Gary Barnett <gbarnett@WSRGM.COM>
From: Gary Barnett <gbarnett@WSRGM.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

>>> Dave Booth <dbooth@CARLSON.COM> 12/07/00 08:56AM >>>
> <snip>
>QWest DSL customers should be aware that QWest do not support the
fixed
>CBOS versions. (confirmed 30 seconds ago by a call to the QWest
>tech-support line) Therefore the sizable QWest dsl customer base is
>likely to remain vulnerable. QWest only support 2.2.0 and my ISP (not
>QWest!) has confirmed that they have encountered several issues
relating
>to higher versions of CBOS on a 675 that connects through a QWest
DSLAM.
> <snip>

I thought I'd give them a call too, and see what they had to say.

I was told that they would be supporting version 2.4.1 within 30 days.

Still not good enough, IMHO, but I suppose they have to work their
issue
lists just like the rest of us.

----

Gary Barnett
Network Administrator
Wells, St. John, et al

home help back first fref pref prev next nref lref last post