I have been told that the July 9 issue is not the flaw in question. Here is as much detail as I have confirmed at this point:
http://news.com.com/2100-1035_3-1026518.html?tag=fd_top -R On Wed, 2003-07-16 at 13:14, christopher neitzert wrote: > Details about the vulnerability here: > http://www.cisco.com/warp/public/707/cisco-sa-20030709-swtcp.shtml > > > Summary > After receiving eight TCP connection attempts using a non-standard TCP > flags combination, a Catalyst switch will stop responding to further TCP > connections to that particular service. In order to re-establish > functionality of that service, the switch must be rebooted. There is no > workaround. This vulnerability affects only CatOS. No other Cisco > products are affected. -- | robert lemos | computer & tech journalist | | v: 510/481-8166 | e: [EMAIL PROTECTED] | _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
