Date: Thu, 20 Sep 2001 20:03:04 +0100 (BST)
From: Cisco Systems Product Security Incident Response Team <psirt@cisco.com.>
To: [email protected]Subject: UPDATE - Cisco Security Advisory: Multiple SSH vulnerabilities
Cc: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Please note that updated version of "Cisco Security Advisory:
Multiple SSH Vulnerabilities", available at
http://www.cisco.com/warp/public/707/SSH-multiple-pub.html
was posted.
Cisco 11000 Content Service Switch family is also vulnerable to
all three vulnerabilities mentioned in the advisory. All WebNS
releases prior, but excluding, versions: R4.01 B42s, R4.10 B22s,
R5.0 B11s, R5.01 B6s, are vulnerable.
For all further information please consult the advisory available
at http://www.cisco.com/warp/public/707/SSH-multiple-pub.html
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
iQEVAwUBO6o3qA/VLJ+budTTAQEXPgf/VnED4958EXTkqN7ME8N/+UbF7OA4sQ3e
AZL6Tb9APLepRbVBvILT1sWOOn5XiZ4KByGwfr+fve1/D8Zp8uDzS3RQkr0c2NFW
ybMNkWLobasA4WAdOFZShKCzs7/JX2GME8pbIeRwLaT25pPleKhzazGJNpqYc22/
8SetSKmzWiZt9soPaYSgIJFoYNcpsukeK7rFMsCDr8h6fR+Hqjlf0nFcKtILRSat
5IqHgfdZHPCvyWzwg0FhD0yYEh5RpTuxkea4/k9WwnS9xeJyK5a7WA/EP01CuraV
jpDJL9USEz6gWWAaIUaIPmap+9kBO0YM5Fijkmb6yBZ376KKefr1Bg==
=OP/D
-----END PGP SIGNATURE-----