Re: Ars breaks Misfortune Cookie vulnerability news to public

2014-12-19 Thread Javier J
Haha, yeah I spoke too soon. Happy Holidays. Also has anyone looked at the list of devices / vendors that are using that software? https://www.allegrosoft.com/about-allegro-software#tabs-896-0-4 Did the vendors know their vendor was giving them buggy software? What is the test for this vuln?

RE: Ars breaks Misfortune Cookie vulnerability news to public

2014-12-19 Thread Frank Bulk
To: Jay Ashworth Cc: NANOG Subject: Re: Ars breaks Misfortune Cookie vulnerability news to public Here’s the thing I don’t get… You have X provider supplying routers with vulnerable firmware that have remote support (TR-069) enabled. Why would Check Point not at least name and shame, instead of

Re: Ars breaks Misfortune Cookie vulnerability news to public

2014-12-19 Thread Niels Bakker
* jav...@advancedmachines.us (Javier J) [Sat 20 Dec 2014, 00:50 CET]: Glad I'm using a freebsd based routing solution. Time to update that one too: https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01 -- Niels.

Re: Ars breaks Misfortune Cookie vulnerability news to public

2014-12-19 Thread Ken Chase
19:25 <@andrewTO> http://mis.fortunecook.ie/misfortune-cookie-suspected-vulnerable.pdf has a list of potentially vulnerable devices 19:25 <@math> andrewTO@opensrs++ /kc -- Ken Chase - k...@heavycomputing.ca skype:kenchase23 +1 416 897 6284 Toronto Canada Heavy Computing - Clued bandwidth, colo

Re: Ars breaks Misfortune Cookie vulnerability news to public

2014-12-19 Thread Eric Tykwinski
Here’s the thing I don’t get… You have X provider supplying routers with vulnerable firmware that have remote support (TR-069) enabled. Why would Check Point not at least name and shame, instead of trying to market their security? I know the hack is old, but grandma isn’t probably up to date o

Re: Ars breaks Misfortune Cookie vulnerability news to public

2014-12-19 Thread Javier J
Glad I'm using a freebsd based routing solution. On Dec 19, 2014 5:54 PM, "Jay Ashworth" wrote: > While the flaw is 12 years old and the fix 9, the article suggests that > firmware for consumer routers may yet be being built with the vulnerable > webserver code baked in. > > If you are responsibl