> mobile: +39 340 4751352
>
> fax: +39 045 4850850
>
> skype: roberto.taccon
>
>
>
> -Messaggio originale-
> Da: NANOG [mailto:nanog-boun...@nanog.org] Per conto di Adrian M
> Inviato: lunedì 15 febbraio 2016 10.06
> A: nanog@nanog.org
> Oggett
oblem:
>
> https://www.reddit.com/r/networking/comments/433kqx/cisco_asa_not_recording_an_arp_entry/
>
>
>
> On Wed, Feb 10, 2016 at 10:36 PM, Sadiq Saif wrote:
>
>> Update your ASAs folks, this is a critical one.
>>
>>
>> ---- Forwarded Message --
Hi,
First, understand how it's done, then maybe you can think of something.
https://blog.exodusintel.com/2016/02/10/firewall-hacking/
If you are stopping IKE with ACL's, you probably need to address NAT-T as
well (udp:4500).
But if you are doing that, you probably don't need IKE active at the ASA
Thus spake Andrew (Andy) Ashley (andre...@aware.co.th) on Thu, Feb 11, 2016 at
02:35:51PM +:
> Is a control-plane ACL to limit isakmp traffic (UDP/500) to an affected ASA
> from desired sources enough to mitigate this attack, until upgrades can be
> performed?
It's worth noting that is not
To: "nanog@nanog.org"
Subject: Re: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and
IKEv2 Buffer Overflow Vulnerability
>Be careful, It appears that something is broken with ARP on this release.
>We have no ARP on lan interface, and somebody else has a similar
:
> Update your ASAs folks, this is a critical one.
>
>
> Forwarded Message
> Subject: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and
> IKEv2 Buffer Overflow Vulnerability
> Date: Wed, 10 Feb 2016 08:06:51 -0800
> From: Cisco Systems Product Se
Update your ASAs folks, this is a critical one.
Forwarded Message
Subject: [c-nsp] Cisco Security Advisory: Cisco ASA Software IKEv1 and
IKEv2 Buffer Overflow Vulnerability
Date: Wed, 10 Feb 2016 08:06:51 -0800
From: Cisco Systems Product Security Incident Response Team
Reply
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS XE Software Network Address Translation Denial of Service
Vulnerability
Advisory ID: cisco-sa-20150923-iosxe
Revision 1.0
For Public Release 2015 September 23 16:00 UTC (GMT)
+---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS and IOS XE Software SSH Version 2 RSA-Based User Authentication
Bypass Vulnerability
Advisory ID: cisco-sa-20150923-sshpk
Revision 1.0
For Public Release 2015 September 23 16:00 UTC (GMT)
+--
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS and IOS XE Software IPv6 First Hop Security Denial of Service
Vulnerabilities
Advisory ID: cisco-sa-20150923-fhs
Revision 1.0
For Public Release 2015 September 23 16:00 UTC (GMT)
+---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS XR Software BVI Routed Packet Denial of Service Vulnerability
Advisory ID: cisco-sa-20150415-iosxr
Revision 1.0
For Public Release 2015 April 15 16:00 UTC (GMT)
Summary
===
A vulnerability in the packet-processing code of Cisco IOS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Multiple Vulnerabilities in Cisco IOS XE Software for Cisco ASR 1000 Series,
Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers
Advisory ID: cisco-sa-20150325-iosxe
Revision 1.0
For Public Release 2015 March 25 16:00 UTC (GMT)
S
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Multiple Vulnerabilities in Cisco IOS Software and IOS XE Software Autonomic
Networking Infrastructure
Advisory ID: cisco-sa-20150325-ani
Revision 1.0
For Public Release 2015 March 25 16:00 UTC (GMT)
Summary
===
The Autonomic Networking Infr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software and IOS XE Software Internet Key Exchange Version 2 Denial
of Service Vulnerabilities
Advisory ID: cisco-sa-20150325-ikev2
Revision 1.0
For Public Release 2015 March 25 16:00 UTC (GMT)
Summary
===
Devices running Cisco IOS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software and IOS XE Software mDNS Gateway Denial of Service
Vulnerability
Advisory ID: cisco-sa-20150325-mdns
Revision 1.0
For Public Release 2015 March 25 16:00 UTC (GMT)
Summary
===
A vulnerability in the multicast DNS (mDNS) gat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Multiple Vulnerabilities in Cisco IOS Software Common Industrial Protocol
Advisory ID: cisco-sa-20150325-cip
Revision 1.0
For Public Release 2015 March 25 16:00 UTC (GMT)
Summary
===
The Cisco IOS Software implementation of the Common Industr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software and IOS XE Software TCP Packet Memory Leak Vulnerability
Advisory ID: cisco-sa-20150325-tcpleak
Revision 1.0
For Public Release 2015 March 25 16:00 UTC (GMT)
Summary
===
A vulnerability in the TCP input module of Cisco IOS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software Virtual Routing and Forwarding ICMP Queue Wedge Vulnerability
Advisory ID: cisco-sa-20150325-wedge
Revision 1.0
For Public Release 2015 March 25 16:00 UTC (GMT)
Summary
===
A vulnerability within the virtual routing and for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software Network Address Translation Denial of Service Vulnerability
Advisory ID: cisco-sa-20140924-nat
Revision 1.0
For Public Release 2014 September 24 16:00 UTC (GMT)
Summary
+==
A vulnerability in the Network Address Translation
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
Advisory ID: cisco-sa-20140924-sip
Revision 1.0
For Public Release 2014 September 24 16:00 UTC (GMT)
Summary
+==
A vulnerability in the Session Initiation Protocol
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software DHCP Version 6 Denial of Service Vulnerability
Advisory ID: cisco-sa-20140924-dhcpv6
Revision 1.0
For Public Release 2014 September 24 16:00 UTC (GMT)
Summary
+==
A vulnerability in the DHCP version 6 (DHCPv6) server implem
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Multiple Vulnerabilities in Cisco IOS Software Multicast Domain Name System
Advisory ID: cisco-sa-20140924-mdns
Revision 1.0
For Public Release 2014 September 24 16:00 UTC (GMT)
Summary
+==
The Cisco IOS Software implementation of the multica
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software Metadata Vulnerabilities
Advisory ID: cisco-sa-20140924-metadata
Revision 1.0
For Public Release 2014 September 24 16:00 UTC (GMT)
Summary
+==
Two vulnerabilities in the metadata flow feature of Cisco IOS Software could
al
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software RSVP Vulnerability
Advisory ID: cisco-sa-20140924-rsvp
Revision 1.0
For Public Release 2014 September 24 16:00 UTC (GMT)
Summary
+==
A vulnerability in the implementation of the Resource Reservation Protocol
(RSVP) in Cisc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software and Cisco IOS XE Software EnergyWise Crafted Packet Denial
of Service Vulnerability
Advisory ID: cisco-sa-20140806-energywise
Revision 1.0
For Public Release 2014 August 6 16:00 UTC (GMT)
+---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS XR Software IPv6 Malformed Packet Denial of Service Vulnerability
Advisory ID: cisco-sa-20140611-ipv6
Revision 1.0
For Public Release 2014 June 11 16:00 UTC (GMT)
Summary
===
A vulnerability in the parsing of malformed Internet Prot
From: Clay Kossmeyer
To: nanog@nanog.org
Cc: Clay Seaman-Kossmeyer (ckossmey)
Sent: Tuesday, April 1, 2014 11:44 AM
Subject: Re: Cisco Security Advisory: Cisco IOS Software SSL VPN Denial of
Service Vulnerability
Hi All -
The Cisco PSIRT has been sending IOS Security Advisories to the
On 04/01/2014 11:44 AM, Clay Kossmeyer wrote:
Hi All -
The Cisco PSIRT has been sending IOS Security Advisories to the NANOG mailing
list for well over a decade. We started this process a long time ago at the
request of the list’s then-membership and haven’t been asked to change since.
Admit
On Tue, 1 Apr 2014, Brandon Butterworth wrote:
The Cisco PSIRT has been sending IOS Security Advisories to
the NANOG mailing list for well over a decade
Thank you, much appreciated
Given that there are a number of forums that more directly
address either Cisco-specific issues or are specific
> The Cisco PSIRT has been sending IOS Security Advisories to
> the NANOG mailing list for well over a decade
Thank you, much appreciated
> Given that there are a number of forums that more directly
> address either Cisco-specific issues or are specific to
> vulnerability announcements, were hap
--- ckoss...@cisco.com wrote:
From: Clay Kossmeyer
[...] we’re happy to discontinue sending to the NANOG list directly.
--
Instead of discontinuing them how about one email that contains
all the details, rather than one email per detail. Simi
On Tue, 01 Apr 2014 15:24:32 -0400, "Chuck Church" said:
> Given that probably 80+% (a guess, but I'd be really surprised at a lower
> figure) of all internet traffic crosses at least one Cisco device somewhere,
> I think it would be a huge disservice to discontinue sending these emails.
Actually,
seemingly
never-discussions on mandatory email legal signatures and other fluff.
Chuck
-Original Message-
From: Clay Kossmeyer [mailto:ckoss...@cisco.com]
Sent: Tuesday, April 01, 2014 2:44 PM
To: nanog@nanog.org
Cc: Clay Seaman-Kossmeyer (ckossmey)
Subject: Re: Cisco Security Advisory:
Hi All -
The Cisco PSIRT has been sending IOS Security Advisories to the NANOG mailing
list for well over a decade. We started this process a long time ago at the
request of the list’s then-membership and haven’t been asked to change since.
Admittedly, vulnerability disclosure/discussion/repo
> But clearly, this is one of those issues where you have a
> good amount of folk on either side of the fence.
and the discussion is about the size of five years of cisco notices and
just as hard to delete
welcome to nanog
randy
On 3/29/2014 12:43 AM, Mark Tinka wrote:
But clearly, this is one of those issues where you have a
good amount of folk on either side of the fence.
I wonder what the ratio of "I don't want that info here" (for various
values of "here") to "Geez! WHY didn't somebody tell me" is.
--
Requ
On Saturday, March 29, 2014 02:34:13 AM Scott Weeks wrote:
> You got 5 (actually 6 this time) perhaps because you're
> only on NANOG. I got over 30 this time and once when
> there were 9 vulnerabilities I got almost 50 emails from
> cisco.
I've always known that Cisco will submit their notices to
--- rdr...@direcpath.com wrote:
From: Robert Drake
because seeing 5 advisories at once is like a giant line break in NANOG
discussions, so it's harder to tune it out and skip the emails :)
They could Bcc: all the lists they are sending to in one set of emails
so the message-id is the same, t
On 3/28/2014 4:11 PM, Scott Weeks wrote:
If a person is on multiple of *NOG mailing lists a lot of these're
received. For example, I got well over 30 of them this round. It'd be
nice to get something brief like this:
--
The Semiannual Cisco IOS Sof
On 3/27/2014 7:44 PM, Alexander Neilson wrote:
> I wonder if they should be invited to only post a single message with
> the titles and links to the alerts so that people can follow it up.
--
If a person is on multiple of *NOG mailing list
On Friday, March 28, 2014 05:48:29 AM Shrdlu wrote:
> Why? Personally, I think it's fine. It only happens (at
> most) every six months (and sometimes more like a year).
I think it's fine too.
As I'm sure you know, if you're a Cisco customer, you can
subscribe to their internal notification serv
On 3/28/2014 12:57 AM, Randy Bush wrote:
Alexander Neilson wrote:
I wonder if they should be invited to only post a single message with
the titles and links to the alerts so that people can follow it up.
i would prefer that the header be in blue, the titles in green, and the
urls in magenta, i
On 3/27/2014 11:57 PM, Randy Bush wrote:
Alexander Neilson wrote:
I wonder if they should be invited to only post a single message with
the titles and links to the alerts so that people can follow it up.
i would prefer that the header be in blue, the titles in green, and the
urls in magenta,
Alexander Neilson wrote:
> I wonder if they should be invited to only post a single message with
> the titles and links to the alerts so that people can follow it up.
i would prefer that the header be in blue, the titles in green, and the
urls in magenta, in comic sans, of course
randy
On 3/27/2014 7:44 PM, Alexander Neilson wrote:
I wonder if they should be invited to only post a single message with
the titles and links to the alerts so that people can follow it up.
Why? Personally, I think it's fine. It only happens (at most) every six
months (and sometimes more like a year
I wonder if they should be invited to only post a single message with the
titles and links to the alerts so that people can follow it up.
They should also include a link to their own list that they send the full
alerts to.
That way there could be some headline alerting to people that there is
On 3/27/2014 4:07 PM, Matt Palmer wrote:
On Wed, Mar 26, 2014 at 10:52:42AM -0600, kendrick eastes wrote:
The Full-disclosure mailing list was recently... retired, I guess cisco
thought NANOG was the next best place.
Nope, they've been sending these things here for as long as I can remember.
I
On Wed, Mar 26, 2014 at 10:52:42AM -0600, kendrick eastes wrote:
> The Full-disclosure mailing list was recently... retired, I guess cisco
> thought NANOG was the next best place.
Nope, they've been sending these things here for as long as I can remember.
I have NFI why -- probably hubris, thinki
For anyone who was subscribed to the old full-disclosure list ... Fydor of nmap
has brought it back to life.
Infolink @ http://insecure.org/news/fulldisclosure/
Subscribe @ http://nmap.org/mailman/listinfo/fulldisclosure
On Mar 26, 2014, at 10:52 AM, kendrick eastes wrote:
> The Full-disclos
The Full-disclosure mailing list was recently... retired, I guess cisco
thought NANOG was the next best place.
On Wed, Mar 26, 2014 at 10:45 AM, rw...@ropeguru.com wrote:
>
> Is this normal for the list to diretly get Cisco security advisories or
> something new. First time I have seen these.
>
These also get posted to other mailing lists, such as cisco-nsp.
jms
On Wed, 26 Mar 2014, rw...@ropeguru.com wrote:
Thanks everyone for the replies. I guess since they are done so infrequently,
I was not a list member the last go around.
Robert
On Wed, 26 Mar 2014 12:58:44 -0400
Andrew L
Thanks everyone for the replies. I guess since they are done so
infrequently, I was not a list member the last go around.
Robert
On Wed, 26 Mar 2014 12:58:44 -0400
Andrew Latham wrote:
Robert
Perfectly normal, almost an announce list for issues like this.
On Wed, Mar 26, 2014 at 12:45 PM
Robert
Perfectly normal, almost an announce list for issues like this.
On Wed, Mar 26, 2014 at 12:45 PM, rw...@ropeguru.com wrote:
>
> Is this normal for the list to diretly get Cisco security advisories or
> something new. First time I have seen these.
>
> Robert
>
>
> On Wed, 26 Mar 2014 12:10
On Wed, 26 Mar 2014, rw...@ropeguru.com wrote:
Is this normal for the list to diretly get Cisco security advisories or
something new. First time I have seen these.
They do this twice a year, all their advisories were sent here about half
a year ago as well.
--
Mikael Abrahamssonemail: s
They don't come out often but it happens. Looks like there were 5 or 6 of them.
James
-Original Message-
From: "rw...@ropeguru.com"
Date: Wed, 26 Mar 2014 12:45:18
To: ;
Reply-To: Robert Webb
Subject: Re: Cisco Security Advisory: Cisco IOS Software SSL VPN Den
Is this normal for the list to diretly get Cisco security advisories
or something new. First time I have seen these.
Robert
On Wed, 26 Mar 2014 12:10:00 -0400
Cisco Systems Product Security Incident Response Team
wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software SSL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software Crafted IPv6 Packet Denial of Service Vulnerability
Advisory ID: cisco-sa-20140326-ipv6
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
===
A vulnerability in the implementation of the IP version 6 (IP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software SSL VPN Denial of Service Vulnerability
Advisory ID: cisco-sa-20140326-ios-sslvpn
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
===
A vulnerability in the Secure Sockets Layer (SSL) VPN subsystem of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software Network Address Translation Vulnerabilities
Advisory ID: cisco-sa-20140326-nat
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
The Cisco IOS Software implementation of the Network Address Translation (NAT)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software Internet Key Exchange Version 2 Denial of Service
Vulnerability
Advisory ID: cisco-sa-20140326-ikev2
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
===
A vulnerability in the Internet Key Exchange Ve
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks
Denial of Service Vulnerability
Advisory ID: cisco-sa-20140326-RSP72010GE
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
===
A vulnerability
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
Advisory ID: cisco-sa-20140326-sip
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
===
A vulnerability in the Session Initiation Protocol (SI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge
Vulnerability
Advisory ID: cisco-sa-20130925-rsvp
Revision 1.0
For Public Release 2013 September 25 16:00 UTC (GMT)
-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability
Advisory ID: cisco-sa-20130925-ike
Revision 1.0
For Public Release 2013 September 25 16:00 UTC (GMT)
- --
Summ
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software DHCP Denial of Service Vulnerability
Advisory ID: cisco-sa-20130925-dhcp
Revision 1.0
For Public Release 2013 September 25 16:00 UTC (GMT)
- --
Summary
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Queue Wedge Denial of Service Vulnerability
Advisory ID: cisco-sa-20130925-wedge
Revision 1.0
For Public Release 2013 September 25 16:00 UTC (GMT)
- --
Summar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Network Address Translation Vulnerabilities
Advisory ID: cisco-sa-20130925-nat
Revision 1.0
For Public Release 2013 September 25 16:00 UTC (GMT)
- --
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Multicast Network Time Protocol Denial of Service
Vulnerability
Advisory ID: cisco-sa-20130925-ntp
Revision 1.0
For Public Release 2013 September 25 16:00 UTC (GMT)
- ---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Zone-Based Firewall and Content Filtering Vulnerability
Advisory ID: cisco-sa-20130925-cce
Revision 1.0
For Public Release 2013 September 25 16:00 UTC (GMT)
-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software IPv6 Virtual Fragmentation Reassembly Denial of Service
Vulnerability
Advisory ID: cisco-sa-20130925-ipv6vfr
Revision 1.0
For Public Release 2013 September 25 16:00 UTC (GMT)
- -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Zone-Based Policy Firewall Session Initiation
Protocol Inspection Denial of Service Vulnerability
Advisory ID: cisco-sa-20130327-cce
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Internet Key Exchange Vulnerability
Advisory ID: cisco-sa-20130327-ike
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Summary
===
The C
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Resource Reservation Protocol Denial of Service
Vulnerability
Advisory ID: cisco-sa-20130327-rsvp
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+--
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Network Address Translation Vulnerability
Advisory ID: cisco-sa-20130327-nat
Revision 1.0
For Public Release 2013 March 27 10:00 UTC (GMT)
+-
Summary
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Smart Install Denial of Service Vulnerability
Advisory ID: cisco-sa-20130327-smartinstall
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Sum
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Protocol Translation Vulnerability
Advisory ID: cisco-sa-20130327-pt
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Summary
===
The Cis
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software IP Service Level Agreement Vulnerability
Advisory ID: cisco-sa-20130327-ipsla
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Summary
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E
Denial of Service Vulnerability
Advisory ID: cisco-sa-20120926-ecc
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT)
+-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software DHCP Denial of Service Vulnerability
Advisory ID: cisco-sa-20120926-dhcp
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT)
+-
Summary
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability
Advisory ID: cisco-sa-20120926-dhcpv6
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT)
+
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Network Address Translation Vulnerabilities
Advisory ID: cisco-sa-20120926-nat
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT)
+-
Summary
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Malformed Border Gateway Protocol Attribute Vulnerability
Advisory ID: cisco-sa-20120926-bgp
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT)
+---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Tunneled Traffic Queue Wedge Vulnerability
Advisory ID: cisco-sa-20120926-c10k-tunnels
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT)
+-
Su
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Intrusion Prevention System Denial of Service Vulnerability
Advisory ID: cisco-sa-20120926-ios-ips
Revision 1.0
For Public Release 2012 September 26 16:00 UTC (GMT)
+-
ink:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html
Cisco Unified Communications Manager is affected by the vulnerability
described in this advisory. A separate Cisco Security Advisory has
been published to disclose the vulnerability that affects the Cisco
Unified Communications Mana
ftware and Cisco IOS XE Software are affected by the
vulnerability described in this advisory. A separate Cisco Security
Advisory has been published to disclose the vulnerability that affects
Cisco IOS Software and Cisco IOS XE Software at the following
location:
http://tools.cisco.com/security/cent
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS XR Software Route Processor Denial of Service Vulnerability
Advisory ID: cisco-sa-20120530-iosxr
Revision 2.0
For Public Release 2012 August 15 16:00 UTC (GMT)
+-
Su
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS XR Software Route Processor Denial of Service Vulnerability
Advisory ID: cisco-sa-20120530-iosxr
Revision 1.0
For Public Release 2012 May 30 16:00 UTC (GMT)
+-
Summar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software RSVP Denial of Service Vulnerability
Advisory ID: cisco-sa-20120328-rsvp
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software Network Address Translation
Vulnerability
Advisory ID: cisco-sa-20120328-nat
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IOS Software
Traffic Optimization Features
Advisory ID: cisco-sa-20120328-mace
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software Zone-Based Firewall Vulnerabilities
Advisory ID: cisco-sa-20120328-zbfw
Revision 1.0
For Public Release 2012 March 28 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco 1 Series Denial of Service
Vulnerability
Advisory ID: cisco-sa-20110928-c10k
Revision 1.0
For Public Release 2011 September 28 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software Smart Install Remote Code
Execution Vulnerability
Advisory ID: cisco-sa-20110928-smart-install
Revision 1.0
For Public Release 2011 September 28 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco IOS Software IP Service Level
Agreement Vulnerability
Advisory ID: cisco-sa-20110928-ipsla
Revision 1.0
For Public Release 2011 September 28 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Unified Communications Manager Session
Initiation Protocol Memory Leak Vulnerability
Advisory ID: cisco-sa-20110928-cucm
Revision 1.0
For Public Release 2011 September 28 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco ASR 9000 Series Routers Line Card IP Version 4
Denial of Service Vulnerability
Advisory ID: cisco-sa-20110720-asr9k
Revision 1.0
For Public Release 2011 July 20 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities
Advisory ID: cisco-sa-20110126-csg2
http://www.cisco.com/warp/public/707/cisco-sa-20110126-csg2.shtml
Revision 1.0
For Public Release 2011 January 26 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco IOS SSL VPN Vulnerability
Advisory ID: cisco-sa-20100922-sslvpn
http://www.cisco.com/warp/public/707/cisco-sa-20100922-sslvpn.shtml
Revision 1.0
For Public Release 2010 September 22 1600 UTC (GMT)
- --
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Unified Communications Manager Session Initiation Protocol
Denial of Service Vulnerabilities
Advisory ID: cisco-sa-20100922-cucmsip
http://www.cisco.com/warp/public/707/cisco-sa-20100922-cucmsip.shtml
Revision 1.0
For Public Release 2010 Sept
1 - 100 of 129 matches
Mail list logo