Has anyone run into this yet?  Does the latest hotfix correct this?

********************
Exploit Code
********************

(8) Ipswitch WhatsUp Gold Buffer Overflow

An exploit has been published to leverage the buffer overflow
vulnerability in the Ipswitch Whatsup Gold product. The exploit works on
Windows 2000/XP systems and spawns a command shell on port 28876.

Council Site Updates: Only one council site provided an update - they
have already patched their systems.

References:
Exploit Code
http://www.securityfocus.com/archive/1/377443/2004-09-27/2004-10-03/0
Previous @RISK Newsletter Posting
http://www.sans.org/newsletters/risk/vol3_34.php  (Item #6)



Jay

Please visit http://www.ipswitch.com/support/mailing-lists.html
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/whatsup_forum%40list.ipswitch.com/

Reply via email to