Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Jason Haar (Jason.Haartrimble.co.nz)
Date: Thu Feb 21 2002 - 19:33:46 CST
On Thu, Feb 21, 2002 at 05:57:18PM -0600, pbsarnacThoughtWorks.com wrote:
> aware of the risks when using this solution. According to
> the pix is only vulnerable from the host specified in your snmp-server host
> config line, which should greatly reduce your risk, but if you should
> definitely plan on upgrading to a patched version at some point.
I'm a frayed knot. :-)
Don't forget, SNMP uses UDP. Therefore the entire exploit can be spoofed...
[ignore the fact that the hacker has to successfully guess your snmp
management stations IP address of course...]
Information Security Manager Trimble Navigation Ltd. Phone: +64 3 9635 377 Fax: +64 3 9635 417
_______________________________________________ Snort-users mailing list Snort-userslists.sourceforge.net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users