Greg,
Did you download the Call Manger 3.1 OS update? It's under the High
Encryption link on CCO. It installs SP2 and the a bunch of IIS updates
and removes some services for security reasons. You don't need to be
running CM 3.1 to use this update. If you have already installed it then
you can disregard this message.
Keith Nelson
Network Administrator
Orange County School of the Arts
[EMAIL PROTECTED]
-----Original Message-----
From: Greg Page [mailto:[EMAIL PROTECTED]]
Sent: Thursday, September 20, 2001 5:59 PM
To: NT System Admin Issues
Subject: RE: Cisco Routers vulnerable to Nimda?
Fortunately my CCM and Unity are inward facing and not running external
xml
services. Cisco is way behind in their patches.
Greg
-----Original Message-----
From: Kelly Borndale [mailto:[EMAIL PROTECTED]]
Sent: Thursday, September 20, 2001 8:38 PM
To: NT System Admin Issues
Subject: Re: Cisco Routers vulnerable to Nimda?
I pulled this from their Code Red Docs:
The following Cisco products are vulnerable because they run affected
versions of Microsoft IIS:
Cisco CallManager
Cisco Unity Server
Cisco uOne
Cisco ICS7750
Cisco Building Broadband Service Manager
IP/VC 3540 Application Server
They have an advisory list that you may want to look into. I don't have
the
info here, but I will look for it -just remind me offline ;)
-K
----- Original Message -----
From: "Sean Martin" <[EMAIL PROTECTED]>
To: "NT System Admin Issues" <[EMAIL PROTECTED]>
Sent: Thursday, September 20, 2001 8:22 PM
Subject: RE: Cisco Routers vulnerable to Nimda?
> The IOS version is 11.295P. Apparently we're a few versions back
> (12.2?). This is a managed service so now I'll have to find out why it
> hasn't been updated. So I guess my question is; Is our version
> vulnerable to the code red/nimda worm(s)?
>
> Regards,
>
> Sean Martin, MCSE
> Network Administrator
> Ribelin Lowell & Company
> Insurance Brokers, Inc.
> 3111 C Street, Suite 300
> Anchorage, Alaska 99503
> Ph: (907) 561-1250
> Fax: (907) 561-4315
> Cell: (907) 229-0885
> Email: [EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>
>
>
> -----Original Message-----
> From: Kelly Borndale [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, September 20, 2001 4:14 PM
> To: NT System Admin Issues
> Subject: Re: Cisco Routers vulnerable to Nimda?
>
>
> Yes, the same Cisco vunerabilities to the Code Red Word exist, if you
> have not updated your router software. What are you running on the
> router, IOS version, etc. ? I wonder if the HP printer vunerability
> is still there as well...?
>
> -K
> ----- Original Message -----
> From: "Sean Martin" <[EMAIL PROTECTED]>
> To: "NT System Admin Issues" <[EMAIL PROTECTED]>
> Sent: Thursday, September 20, 2001 7:50 PM
> Subject: Cisco Routers vulnerable to Nimda?
>
>
> > Has anyone heard of any Cisco vulnerabilities to the recent Nimda
> > worm?
> I'm
> > experiencing some weird behavior from my Cisco 1601. The
> > connectivity
> seems
> > to be going up and down, mainly down. At one point during testing
> > with
the
> > ISP, they showed the protocol link being down, but everything else
> > was
> > working(?) I even had our IPsec tunnel established with packets
going
both
> > directions, yet none of the users had connectivity through the
> > tunnel or
> out
> > to the internet.
> >
> > T1 circuit -------- Cisco 1601 (E0 interface) --------- Watchguard
> > SOHO
> > ------- HP Switch
> >
> > I'll get into the complete scenario once I determine whether or not
> there's
> > any factors I haven't ruled out.
> >
> > Regards,
> >
> > Sean Martin, MCSE
> > Network Administrator
> > Ribelin Lowell & Company
> > Insurance Brokers, Inc.
> > 3111 C Street, Suite 300
> > Anchorage, Alaska 99503
> > Ph: (907) 561-1250
> > Fax: (907) 561-4315
> > Cell: (907) 229-0885
> > Email: [EMAIL PROTECTED]
> <mailto:[EMAIL PROTECTED]>
> > DO NOT read, copy or disseminate this communication unless you are
> > the intended addressee. This e-mail communication contains
> > confidential
and/or
> > privileged information intended only for the addressee. If you have
> received
> > this communication in error, please call us immediately at (907)
561-1250
> > and ask to speak to the sender of the communication. Also, please
> > e-mail
> the
> > sender and notify the sender immediately that you have received the
> > communication in error.
> >
> > http://www.sunbelt-software.com/ntsysadmin_list_charter.htm
> >
> >
>
>
> http://www.sunbelt-software.com/ntsysadmin_list_charter.htm
> DO NOT read, copy or disseminate this communication unless you are the
> intended addressee. This e-mail communication contains confidential
> and/or privileged information intended only for the addressee. If you
> have
received
> this communication in error, please call us immediately at (907)
> 561-1250 and ask to speak to the sender of the communication. Also,
> please e-mail
the
> sender and notify the sender immediately that you have received the
> communication in error.
>
> http://www.sunbelt-software.com/ntsysadmin_list_charter.htm
>
>
http://www.sunbelt-software.com/ntsysadmin_list_charter.htm
http://www.sunbelt-software.com/ntsysadmin_list_charter.htm
http://www.sunbelt-software.com/ntsysadmin_list_charter.htm