nanog mailing list archives
Ars breaks Misfortune Cookie vulnerability news to public
From: Jay Ashworth <jra () baylink com>
Date: Fri, 19 Dec 2014 17:54:03 -0500 (EST)
While the flaw is 12 years old and the fix 9, the article suggests that firmware for consumer routers may yet be being built with the vulnerable webserver code baked in. If you are responsible for lots of eyeballs you might want to look at this. http://arstechnica.com/security/2014/12/12-million-home-and-business-routers-vulnerable-to-critical-hijacking-hack/ Have a nice Christmas weekend. :-) Cheers, -- jra -- Jay R. Ashworth Baylink jra () baylink com Designer The Things I Think RFC 2100 Ashworth & Associates http://www.bcp38.info 2000 Land Rover DII St Petersburg FL USA BCP38: Ask For It By Name! +1 727 647 1274
Current thread:
- Ars breaks Misfortune Cookie vulnerability news to public Jay Ashworth (Dec 19)
- Re: Ars breaks Misfortune Cookie vulnerability news to public Javier J (Dec 19)
- Re: Ars breaks Misfortune Cookie vulnerability news to public Niels Bakker (Dec 19)
- Re: Ars breaks Misfortune Cookie vulnerability news to public Javier J (Dec 19)
- Re: Ars breaks Misfortune Cookie vulnerability news to public Niels Bakker (Dec 19)
- Re: Ars breaks Misfortune Cookie vulnerability news to public Eric Tykwinski (Dec 19)
- Re: Ars breaks Misfortune Cookie vulnerability news to public Ken Chase (Dec 19)
- RE: Ars breaks Misfortune Cookie vulnerability news to public Frank Bulk (Dec 19)
- Re: Ars breaks Misfortune Cookie vulnerability news to public Javier J (Dec 19)