[AusNOG] bash bug !

Chris Barnes chris.p.barnes at gmail.com
Sat Sep 27 13:03:24 EST 2014


Mark, not at all. I just meant the integrator believed our only exposure
was via the management interface but I wasn't entirely convinced of that.

Andy, thanks for the links.

-- 
Kind Regards,

Christopher Barnes

e. chris.p.barnes at gmail.com
On 27/09/2014 12:35 PM, "Andy S." <ciscoarc7 at gmail.com> wrote:

> That's what I heard too, Chris.
>
> Anyway, here is the official from F5:
>
> https://devcentral.f5.com/articles/cve-2014-6271-shellshocked
>
> http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
>
> regards,
> Andy
>
> On Saturday, September 27, 2014, Chris Barnes <chris.p.barnes at gmail.com>
> wrote:
>
>> Do you have anymore info on this?
>>
>> The integrator who supports my F5s told me only the management interface
>> is vulnerable, public facing interfaces aren't.
>>
>> Not entirely convinced.
>>
>> --
>> Kind Regards,
>>
>> Christopher Barnes
>>
>> e. chris.p.barnes at gmail.com
>> On 27/09/2014 12:25 PM, "Noel Butler" <noel.butler at ausics.net> wrote:
>>
>>> F5's BIG-IP 11.6.0 also vulnerable
>>>
>>>
>>> _______________________________________________
>>> AusNOG mailing list
>>> AusNOG at lists.ausnog.net
>>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>>
>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140927/85c35592/attachment.html>


More information about the AusNOG mailing list