[32914] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Multiple vulnerabilites in vendor IKE implementations, including

daemon@ATHENA.MIT.EDU (Chris)
Fri Dec 19 17:38:44 2003

Message-ID: <3FE21871.3020905@engsoc.org>
Date: Thu, 18 Dec 2003 16:13:21 -0500
From: Chris <serlin@engsoc.org>
MIME-Version: 1.0
To: sha@cisco.com
Cc: Thor Lancelot Simon <tls@rek.tjls.com>, bugtraq@securityfocus.com
In-Reply-To: <200312122110.52711.sha@cisco.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit


>This is in response to the mail posted by Thor Lancelot Simon. The original 
>mail is available at http://www.securityfocus.com/archive/1/347351 in which 
>Thor has listed two issues. Documented below is Cisco's response to them.
>
>Issue #1: Cisco addressed this issue as part of CSCdw87717 wherein the Cert 
>Domain Name verification feature was implemented. This issue has been 
>documented under the Cisco security advisory
>http://www.cisco.com/warp/public/707/vpnclient-multiple2-vuln-pub.shtml.
>  
>

I've looked through the literature and the software (4.0 rel) for the 
past week, I haven't been able to find
anything related to this. I've had several people brighter than I look 
into this, they also weren't able to find any
sort of fix. we may very well may have missed it, but is it possible 
this feature went missing in 4.0?

Thanks,
Chris


home help back first fref pref prev next nref lref last post