Has anyone run into this yet? Does the latest hotfix correct this? ******************** Exploit Code ********************
(8) Ipswitch WhatsUp Gold Buffer Overflow An exploit has been published to leverage the buffer overflow vulnerability in the Ipswitch Whatsup Gold product. The exploit works on Windows 2000/XP systems and spawns a command shell on port 28876. Council Site Updates: Only one council site provided an update - they have already patched their systems. References: Exploit Code http://www.securityfocus.com/archive/1/377443/2004-09-27/2004-10-03/0 Previous @RISK Newsletter Posting http://www.sans.org/newsletters/risk/vol3_34.php (Item #6) Jay Please visit http://www.ipswitch.com/support/mailing-lists.html to be removed from this list. An Archive of this list is available at: http://www.mail-archive.com/whatsup_forum%40list.ipswitch.com/
