Actually there is a code snippet on paste in about this and there is
development going on with exploits so honestly on this on patch now.

Ez
On Nov 12, 2014 8:59 PM, "Andrew S. Baker" <[email protected]> wrote:

> There's nothing in the wild *as yet*, but given the wormable potential, I
> would expect exploit code within 4-6 business days.
>
> Patch perimeter exposed systems as soon as you can, and work from there.
>
> Be advised that if a client system gets hit, it will be able to hit all
> the systems that it has access to within your network.
>
> Regards,
>
>
>
>
>
>
> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
> *Providing Virtual CIO Services (IT Operations & Information Security) for
> the SMB market…*
>
>
>
> On Wed, Nov 12, 2014 at 3:06 PM, geoff taylor <[email protected]>
> wrote:
>
>>  Looking for opinions on how urgent this is, and your plan of attack.
>> No shortage of people crying Wolf.  As usual SANs is balanced and sane
>> recognizing the possible severe implications and yet acknowledging that a
>> well thought out patching approach (expedited perhaps) is the best defense.
>>
>>
>>
>> *http://preview.tinyurl.com/phz3my4 <http://preview.tinyurl.com/phz3my4> *
>> gt
>>
>
>

Reply via email to