TIP: Click on subject to list as thread! ANSI
echo: os2user-l
to: All
from: `Julian Thomas`
date: 2004-07-11 22:37:38
subject: Re: OT: SMC Port Vulnerability

In , on 07/08/04 
   at 08:52 AM, "Stanley Sidlov"  typed:

>A port 1900 vulnerability allowing your router to be managed remotely
>(even if you did not enable remote  management) was found in most SMC
>routers. Firmware to update it has been posted to the SMC.COM web site.

Checking for my router (part number 750.5702) the downloads have file
dates (inside the zip file) of early 2003.

 
-- 
 Julian Thomas:   jt{at}jt-mj.net    http://jt-mj.net
 In the beautiful Finger Lakes Wine Country of New York State!
 Boardmember of POSSI.org - Phoenix OS/2 Society, Inc  http://www.possi.org
 -- --
 31.69 nHz = once a year.





------------------------ Yahoo! Groups Sponsor --------------------~--> 
Yahoo! Domains - Claim yours for only $14.70
http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/E8folB/TM
--------------------------------------------------------------------~-> 

 
Yahoo! Groups Links

 To visit your group on the web, go to:
    http://groups.yahoo.com/group/os2user/

 To unsubscribe from this group, send an email to:
    os2user-unsubscribe{at}yahoogroups.com

 Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 


---
* Origin: Waldo's Place USA Internet Gateway (1:3634/1000)
SEEN-BY: 633/267 270
@PATH: 3634/1000 12 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.