Archive of CERT general posting, New information regarding CERT Advisory CA-2003-15

18/07/03, New information regarding CERT Advisory CA-2003-15
From: CERT Advisory <cert-advisory@cert.org>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: cert-advisory@cert.org
Subject: New information regarding CERT Advisory CA-2003-15
From: CERT Advisory <cert-advisory@cert.org>
Date: Thu, 17 Jul 2003 19:34:35 -0400
List-archive: <http://wwww.cert.org/>
List-help: <http://www.cert.org/>, <mailto:Majordomo@cert.org?body=help>
List-owner: <mailto:cert-advisory-owner@cert.org>
List-post: NO (posting not allowed on this list)
List-subscribe: <mailto:Majordomo@cert.org?body=subscribe%20cert-advisory>
List-unsubscribe: <mailto:Majordomo@cert.org?body=unsubscribe%20cert-advisory>
Mail-from: From cert-advisory-owner@cert.org Fri Jul 18 07:16:55 2003
Organization: CERT(R) Coordination Center - +1 412-268-7090

-----BEGIN PGP SIGNED MESSAGE-----

Cisco Systems has posted an update to their recent Cisco Security
Advisory, which was referenced in CERT Advisory CA-2003-15. This
update includes more specific technical details and new information
about more specific Access Control Lists (ACLs) that can be used to
protect vulnerable devices. The updated Cisco Security Advisory is
available at:

http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml

If you have already upgraded, no new action is required. Similarly, if
you have applied ACLs previously and are satisfied with them, no new
action is required (though upgrading is still recommended). This new
information is useful if you use an intrusion detection system or
network monitoring system, or if you need to apply a more specific
ACL.

No exploits are known to exist publicly at this time.




-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBPxcsRGjtSoHZUTs5AQHOdAQAikk+2HZT0v0/jWDNmPuKPCSInjb7px2P
rEyUjKRZOMPzeYiwyDplJzRnkqurBv2ay6VXaFIDMAYpea/ME0oksZHERifNTmJf
PmJ2C+kczi1bWCIYD6P3JqXuqxxWPYmb95KLBh8hxwaiAxrblziPenx3Op31DwSo
07sZslA3IIE=
=xz6v
-----END PGP SIGNATURE-----



Previous message sorted by date: CERT Advisory CA-2003-16 Buffer Overflow in Microsoft RPC
Next message sorted by date: CERT Advisory CA-2003-17 Exploit available for for the Cisco IOS Interface
Previous message sorted by thread: CERT Advisory CA-2003-16 Buffer Overflow in Microsoft RPC
Next message by thread: CERT Advisory CA-2003-17 Exploit available for for the Cisco IOS Interface
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Jan 2004