nanog mailing list archives
Re: Cisco Vulnerability Testing Results
From: alex () yuriev com
Date: Sat, 19 Jul 2003 10:10:36 -0400 (EDT)
All other prior versions of IOS do not contain the software that introduced the vulnerability and are probably not vulnerable, but I will not be able to confirm that by testing it.So.. everyone running AGS+'s in the core, beware.. *grin*The workarounds should apply, but not much else. ;-)
"We are C. We never have a fix. We have a patch... after patch.... after patch... after patch... after patch... and at some point there is no more patches, but there is no fix either" I have this brilliantly simple idea that somehow everyone forgets, while they tout all the new "advanced stuff". Do not introduce yet another name for filtering that works only in some cases. Fix the filtering code so we can filter *anything* at *any packet rate* on *any interface* that pass *any traffic* without bringing the router to its knees. Alex
Current thread:
- Cisco Vulnerability Testing Results Jason Frisvold (Jul 18)
- Re: Cisco Vulnerability Testing Results Jason Frisvold (Jul 18)
- Re: Cisco Vulnerability Testing Results Jason Frisvold (Jul 18)
- Re: Cisco Vulnerability Testing Results Jason Frisvold (Jul 18)
- Re: Cisco Vulnerability Testing Results Jim Duncan (Jul 18)
- Re: Cisco Vulnerability Testing Results alex (Jul 19)
- Re: Cisco Vulnerability Testing Results Richard Irving (Jul 19)
- Re: Cisco Vulnerability Testing Results Peter Galbavy (Jul 19)
- Re: Cisco Vulnerability Testing Results Jason Frisvold (Jul 18)
- <Possible follow-ups>
- Re: Cisco Vulnerability Testing Results Neil J. McRae (Jul 22)
- Re: Cisco Vulnerability Testing Results Peter Galbavy (Jul 22)
- RE: Cisco Vulnerability Testing Results Bob German (Jul 22)
- Re: Cisco Vulnerability Testing Results Peter Galbavy (Jul 22)