FYI. Mark.
---------- Forwarded Message ---------- Subject: Cisco Security Response: VTY Authentication Bypass Vulnerability Date: Thursday 30 August 2007 05:28 From: Cisco Product Alert Tool <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Message Type : Security Response Title: Cisco Security Response: VTY Authentication Bypass Vulnerability URL: http://www.cisco.com/en/US/customer/products/products_securit y_response09186a00808ae4ca.html (available to registered users) http://www.cisco.com/en/US/products/products_security_respons e09186a00808ae4ca.html (available to non-registered users) Posted: August 29, 2007 Summary: This is the Cisco PSIRT response to the NileSOFT Security Advisory entitled "Bypass Authentication Vulnerability on Cisco Catalyst 3750 12.2(25)", posted on 2007 August 29th at 0900 UTC (GMT). The original advisory was posted to a Korean website. This vulnerability was previously discovered and reported to Cisco by a customer in April 2005, and the contents of the Cisco bug ID have been available on Cisco.com since April 2005. This vulnerability is documented in Cisco bug ID CSCsa91175. This email has been sent to [EMAIL PROTECTED] You are receiving this notice because you subscribed to the Cisco Product Alert Tool (PAT) and created the following profile(s): Cisco Field Notices Subscribe/unsubscribe instructions : If you choose not to receive these notices, or if you would like to make changes to your notification profile, please go to: http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?loca l=en -------------------------------------------------------
pgpBfdiCPd9jw.pgp
Description: PGP signature
_______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
