There's nothing in the wild *as yet*, but given the wormable potential, I
would expect exploit code within 4-6 business days.

Patch perimeter exposed systems as soon as you can, and work from there.

Be advised that if a client system gets hit, it will be able to hit all the
systems that it has access to within your network.

Regards,






*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market...*



On Wed, Nov 12, 2014 at 3:06 PM, geoff taylor <[email protected]>
wrote:

>  Looking for opinions on how urgent this is, and your plan of attack.
> No shortage of people crying Wolf.  As usual SANs is balanced and sane
> recognizing the possible severe implications and yet acknowledging that a
> well thought out patching approach (expedited perhaps) is the best defense.
>
>
>
> *http://preview.tinyurl.com/phz3my4 <http://preview.tinyurl.com/phz3my4> *
> gt
>

Reply via email to