Full Disclosure mailing list archives
Re: RE: Getting a clue at Cisco
From: Andrew Simmons <asimmons () messagelabs com>
Date: Tue, 02 Aug 2005 10:17:07 +0100
Sam Evans wrote:
Just curious -- if the April patch fixed the vulnerability discussed, then that would mean (according to Cisco) that the vulnerability affected IPV6 and not IPV4, correct?
As has been pointed out elsewhere - IPv6 is enabled by default on many (all?) Cisco devices. The target machine has to be on the same network segment as the attacker, too, which restricts attacking hosts to, uh,.. other routers...
\a -- Andrew Simmons Technical Security Consultant MessageLabs Mobile: +44 (7917) 178745 asimmons () messagelabs com www.messagelabs.com MessageLabs - Be certain ______________________________________________________________________ This email has been scanned by the MessageLabs Email Security System.For more information please visit http://www.messagelabs.com/email ______________________________________________________________________
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- RE: Getting a clue at Cisco Daniel Sichel (Aug 01)
- Re: RE: Getting a clue at Cisco Frank Knobbe (Aug 01)
- Re: RE: Getting a clue at Cisco byte_jump (Aug 01)
- Re: RE: Getting a clue at Cisco Sam Evans (Aug 01)
- Re: RE: Getting a clue at Cisco Andrew Simmons (Aug 02)
- Re: RE: Getting a clue at Cisco Ćukasz Bromirski (Aug 02)
- Re: RE: Getting a clue at Cisco byte_jump (Aug 01)
- Re: RE: Getting a clue at Cisco Frank Knobbe (Aug 01)