[nsp] 2950's vulnerable

Matt Ploessel matt.ploessel at foundstone.com
Fri Jul 18 15:04:43 EDT 2003


It is my understanding that vulnerable IOS devices need to have an IPv4
address. If the switch has an ip on vlans/etc then yes.

...

Matt Ploessel
Network Security Engineer
Foundstone, Inc.
Strategic Security

949.297.5622 Tel 
949.297.5575 Fax 

http://www.foundstone.com
PGP: https://www.foundstone.com/pgpkeys/matt_ploessel.asc
PGP Hash: 5233 27A0 E504 2887 0F6F 0218 7495 1EB2 F182 E914

This email may contain confidential and privileged information for the
sole use of the intended recipient. Content disclosure to third parties
is strictly prohibited. Verify sender and message body authenticity
against the above PGP key only, retrieved via a secure and dependable
method. Thank you.

> -----Original Message-----
> From: Matt Stockdale [mailto:mstockda at logicworks.net] 
> Sent: Friday, July 18, 2003 12:59 PM
> To: cisco-nsp at puck.nether.net
> Subject: [nsp] 2950's vulnerable
> 
> 
> Any idea if Catalyst 2950's are vulnerable to the latest 
> exploit, since they don't actually route anything? I'm not 
> looking forward to upgrading
> 40+ of these.. I didn't see anything on the advisory about them..
> 
> -- 
> ------------------------------------------
> Matt Stockdale              Logicworks
> Sr. Network Engineer    www.logicworks.net
> mstockda at logicworks.net  (212) 625-5307
> 
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net 
> http://puck.nether.net/mailman/listinfo/cisco-> nsp
> archive at 
> http://puck.nether.net/pipermail/cisco-nsp/
> 



More information about the cisco-nsp mailing list