That page has the download link on it. On Thu, Jan 31, 2013 at 3:24 PM, Andrew S. Baker <asbz...@gmail.com> wrote:
> Are you actually able to download via that link? > > > > > > *ASB > **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>* > **Providing Virtual CIO Services (IT Operations & Information Security) > for the SMB market…*** > > > > > > On Thu, Jan 31, 2013 at 4:07 PM, Ziots, Edward <ezi...@lifespan.org>wrote: > >> >> http://www.rapid7.com/resources/free-security-software-downloads/universal-plug-and-play-jan-2013.jsp >> **** >> >> ** ** >> >> Nice detection utility which will help out the home users. **** >> >> ** ** >> >> Z**** >> >> ** ** >> >> Edward E. Ziots, CISSP, Security +, Network +**** >> >> Security Engineer**** >> >> Lifespan Organization**** >> >> ezi...@lifespan.org**** >> >> ** ** >> >> This electronic message and any attachments may be privileged and >> confidential and protected from disclosure. If you are reading this >> message, but are not the intended recipient, nor an employee or agent >> responsible for delivering this message to the intended recipient, you are >> hereby notified that you are strictly prohibited from copying, printing, >> forwarding or otherwise disseminating this communication. If you have >> received this communication in error, please immediately notify the sender >> by replying to the message. Then, delete the message from your computer. >> Thank you.**** >> >> *[image: Description: Description: Lifespan]* >> >> ** ** >> >> ** ** >> >> *From:* Ziots, Edward [mailto:ezi...@lifespan.org] >> *Sent:* Thursday, January 31, 2013 1:04 PM >> >> *To:* NT System Admin Issues >> *Subject:* RE: Ouch - UPnP >> *Importance:* High**** >> >> ** ** >> >> Cross post from Bugtraq, **** >> >> ** ** >> >> DefenseCode Security Advisory**** >> >> http://www.defensecode.com/**** >> >> ** ** >> >> ** ** >> >> Broadcom UPnP Remote Preauth Root Code Execution Vulnerability**** >> >> ** ** >> >> ** ** >> >> Advisory ID: DC-2013-01-003**** >> >> Advisory Title: Broadcom UPnP Remote Preauth Root Code Execution >> Vulnerability Advisory URL: >> http://www.defensecode.com/subcategory/advisories-28**** >> >> Software: Broadcom UPnP software**** >> >> Vulnerable: Multiple router manufacturers Vendor Status: Vendors >> contacted Initial Release Date: 2013-01-15 Release Date Postponed To: >> 2013-01-31**** >> >> Risk: Critical**** >> >> ** ** >> >> ** ** >> >> ** ** >> >> 1. General Overview**** >> >> ===================**** >> >> ** ** >> >> During the security evaluation of Cisco Linksys routers for a client, we >> have discovered a critical security vulnerability that allows remote >> unauthenticated attacker to remotely execute arbitrary code under root >> privileges.**** >> >> Upon initial vulnerability announcement a few weeks ago Cisco spokesman >> stated that only one router model is vulnerable - WRT54GL.**** >> >> We have continued with our research and found that, in fact, same >> vulnerable firmware component is also used in at least two other Cisco >> Linksys models - WRT54G3G and probably WRT310N. Could be others.**** >> >> ** ** >> >> Moreover, vulnerability turns out even more dangerous, since we have >> discovered that same vulnerable firmware component is also used across many >> other big-brand router manufacturers and many smaller vendors.**** >> >> ** ** >> >> Vulnerability itself is located in Broadcom UPnP stack, which is used by >> many router manufacturers that produce or produced routers based on >> Broadcom chipset.**** >> >> We have contacted them with vulnerability details and we expect patches >> soon. However, we would like to point out that we have sent more than 200 >> e-mails to various router manufacturers and various people, without much >> success.**** >> >> ** ** >> >> Some of the manufacturers contacted regarding this vulnerability are >> Broadcom, Asus, Cisco, TP-Link, Zyxel, D-Link, Netgear, US Robotics, and so >> on.**** >> >> Routers with vulnerable Broadcom UPnP stack are mostly based on Broadcom >> UPnP chipset. You can check how many manufacturers use Broadcom chipset** >> ** >> >> here: http://wiki.openwrt.org/toh/start (search for Broadcom, brcm or >> bcm).**** >> >> ** ** >> >> We don't know exactly how many of them are affected, since we were unable >> to contact all of them, but we suspect there are probably tens of millions >> vulnerable routers out there.**** >> >> ** ** >> >> ** ** >> >> Edward E. Ziots, CISSP, Security +, Network +**** >> >> Security Engineer**** >> >> Lifespan Organization**** >> >> ezi...@lifespan.org**** >> >> ** ** >> >> This electronic message and any attachments may be privileged and >> confidential and protected from disclosure. If you are reading this >> message, but are not the intended recipient, nor an employee or agent >> responsible for delivering this message to the intended recipient, you are >> hereby notified that you are strictly prohibited from copying, printing, >> forwarding or otherwise disseminating this communication. If you have >> received this communication in error, please immediately notify the sender >> by replying to the message. Then, delete the message from your computer. >> Thank you.**** >> >> *[image: Description: Description: Lifespan]* >> >> ** ** >> >> ** ** >> >> *From:* David Lum [mailto:david....@nwea.org <david....@nwea.org>] >> *Sent:* Thursday, January 31, 2013 12:37 PM >> *To:* NT System Admin Issues >> *Subject:* RE: Ouch - UPnP**** >> >> ** ** >> >> See the thread called “Shocking? Somehow, not...”**** >> >> ** ** >> >> Having a more descriptive subject line like yours is far too logical J*** >> * >> >> ** ** >> >> *From:* N Parr [mailto:npar...@mortonind.com <npar...@mortonind.com>] >> *Sent:* Thursday, January 31, 2013 9:30 AM >> *To:* NT System Admin Issues >> *Subject:* Ouch - UPnP**** >> >> ** ** >> >> >> http://news.cnet.com/8301-1009_3-57566366-83/upnp-networking-flaw-puts-millions-of-pcs-at-risk/?tag=nl.e757&s_cid=e757 >> **** >> >> **** >> >> Guess it would mostly affect home users but they are going to be the ones >> who would never hear about it for be able to fix it.**** >> >> **** >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to listmana...@lyris.sunbeltsoftware.com >> with the body: unsubscribe ntsysadmin**** >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to listmana...@lyris.sunbeltsoftware.com >> with the body: unsubscribe ntsysadmin**** >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to listmana...@lyris.sunbeltsoftware.com >> with the body: unsubscribe ntsysadmin**** >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to listmana...@lyris.sunbeltsoftware.com >> with the body: unsubscribe ntsysadmin >> > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to listmana...@lyris.sunbeltsoftware.com > with the body: unsubscribe ntsysadmin > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
<<image001.jpg>>