North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Cisco cover up

  • From: Mark Owen
  • Date: Thu Jul 28 13:46:27 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=L+xLAzhxNV8a1JMzqPGuZa46X9aFDBbCaKfMS0whzsvV513jNxzCZmA7nPQyrxtvw145wjmNf2w4DM6mLU0XzB2xUbELTtOsjg3i8BIJ05reI951CdxV6QeikKDRTolPdVKHNE2n6MiPvGXneDYExNzvHMEEpYcT7O+ljtI5VQA=

On 7/27/05, J. Oquendo <[email protected]> wrote:

> Complete PR disaster? Maybe they're still working on the fix and didn't
> want those on the blackhat scene to have a glimpse of how they intended on
> fixing things. I wonder if this has exploit_foo_bar has anything to do
> with their code being stolen earlier this year was it, or late last year.
> Maybe for the geeks in you, it may be a PR disaster, but I doubt their
> stock price will come down much. Oddly I wonder if those in gov are
> watching closely to those who are running around shorting Cisco stock. Or
> should that be: "sh0rt1ng c1sc0 [email protected]$"

Cisco had the exploit fixed in April and no longer offers the
exploitable OS for download on their site.


-- 
Mark Owen