lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <42EF3A13.9010808@messagelabs.com>
Date: Tue Aug  2 14:50:35 2005
From: asimmons at messagelabs.com (Andrew Simmons)
Subject: RE: Getting a clue at Cisco

Sam Evans wrote:

> Just curious -- if the April patch fixed the vulnerability discussed, then 
> that would mean (according to Cisco) that the vulnerability affected IPV6 
> and not IPV4, correct?
>  


As has been pointed out elsewhere - IPv6 is enabled by default on many 
(all?) Cisco devices. The target machine has to be on the same network 
segment as the attacker, too, which restricts attacking hosts to, uh,.. 
other routers...


\a

-- 
Andrew Simmons
Technical Security Consultant
MessageLabs

Mobile: +44 (7917) 178745
asimmons@...sagelabs.com
  www.messagelabs.com

MessageLabs - Be certain

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ