[c-nsp] Cisco Security Advisory: Multiple Crafted IPv6 Packets
Cause Reload
Kim Onnel
karim.adel at gmail.com
Wed Jan 26 11:21:09 EST 2005
Was that why all tier-1 providers were upgrading ?
On Wed, 26 Jan 2005 16:13:35 +0000, Ryan O'Connell
<ryan at complicity.co.uk> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 26/01/2005 16:00, Cisco Systems Product Security Incident Response
> Team wrote:
>
> | Cisco Security Advisory: Multiple Crafted IPv6 Packets Cause Reload
> |
> [snip]
>
> | There are workarounds available to mitigate the effects.
>
> There is actually no workaround mentioned in the advisory - is there
> actually one available or is an IOS upgrade the only fix?
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.3 (MingW32)
> Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
>
> iD8DBQFB98GsoaLhvISWLh0RAoiFAKCVKyVO5Klj4lZtaOSWhZdCTAalzwCfSDFX
> BNgH62txNG4NB+jsN6bqTn4=
> =5076
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
More information about the cisco-nsp
mailing list