| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: New Windows flaw and patch |
From: Mike N. On Thu, 12 Feb 2004 12:04:30 -0500, "Frank Haber" wrote: >Now, I have no idea whether or how badly other opsyses are vulnerable, how >deeply ASN is buried in them, how modular their code is, and how fast their >developers can respond. I From what I can see, it's not ASN itself, but how it was implemented. If other OpSys's share code or implementation problems, it could become similar to the SNMP problem. There's still a boatload of hardware that we have to manage via SNMP which runs the original vulnerable version. We write router ACLs to minimize exposure, but there's only so much you can do with some of it. Luckily, they can't do more than bring the device down. --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.