lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA-2003-15.2@cert.org>
Date: Thu, 17 Jul 2003 19:48:07 -0400
From: CERT Advisory <cert-advisory@...t.org>
To: cert-advisory@...t.org
Subject: New information regarding CERT Advisory CA-2003-15



-----BEGIN PGP SIGNED MESSAGE-----

Cisco Systems has posted an update to their recent Cisco Security
Advisory, which was referenced in CERT Advisory CA-2003-15. This
update includes more specific technical details and new information
about more specific Access Control Lists (ACLs) that can be used to
protect vulnerable devices. The updated Cisco Security Advisory is
available at:

http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml

If you have already upgraded, no new action is required. Similarly, if
you have applied ACLs previously and are satisfied with them, no new
action is required (though upgrading is still recommended). This new
information is useful if you use an intrusion detection system or
network monitoring system, or if you need to apply a more specific
ACL.

No exploits are known to exist publicly at this time.




-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBPxcsRGjtSoHZUTs5AQHOdAQAikk+2HZT0v0/jWDNmPuKPCSInjb7px2P
rEyUjKRZOMPzeYiwyDplJzRnkqurBv2ay6VXaFIDMAYpea/ME0oksZHERifNTmJf
PmJ2C+kczi1bWCIYD6P3JqXuqxxWPYmb95KLBh8hxwaiAxrblziPenx3Op31DwSo
07sZslA3IIE=
=xz6v
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ