Howdy, I'm reviewing this vulnerability for IOS:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte In the advisory it doesn't seem to mention whether the code execution happens pre or post the application of the ACL? Consider this example: snmp-server community YourVerySecureCommunityString RO 60 I assume that the ACL blocking access to hosts other than the NMS would be enough to prevent this from being super widely exploitable but its IOS so I am thinking in IOS terms. Anyone have any details on that? Thanks, -Drew _______________________________________________ cisco-nsp mailing list [email protected] https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
