TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Frank Haber
from: Mike N.
date: 2004-02-12 23:45:58
subject: Re: New Windows flaw and patch

From: Mike N. 

On Thu, 12 Feb 2004 12:04:30 -0500, "Frank Haber"
 wrote:

>Now, I have no idea whether or how badly other opsyses are vulnerable, how
>deeply ASN is buried in them, how modular their code is, and how fast their
>developers can respond.  I

   From what I can see, it's not ASN itself, but how it was implemented.
If other OpSys's share code or implementation problems, it could become
similar to the SNMP problem.   There's still a boatload of hardware that we
have to manage via SNMP which runs the original vulnerable version.  We
write router ACLs to minimize exposure, but there's only so much you can do
with some of it.   Luckily, they can't do more than bring the device down.

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.