[AusNOG] bash bug !
Andy S.
ciscoarc7 at gmail.com
Sat Sep 27 12:35:23 EST 2014
That's what I heard too, Chris.
Anyway, here is the official from F5:
https://devcentral.f5.com/articles/cve-2014-6271-shellshocked
http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
regards,
Andy
On Saturday, September 27, 2014, Chris Barnes <chris.p.barnes at gmail.com>
wrote:
> Do you have anymore info on this?
>
> The integrator who supports my F5s told me only the management interface
> is vulnerable, public facing interfaces aren't.
>
> Not entirely convinced.
>
> --
> Kind Regards,
>
> Christopher Barnes
>
> e. chris.p.barnes at gmail.com
> <javascript:_e(%7B%7D,'cvml','chris.p.barnes at gmail.com');>
> On 27/09/2014 12:25 PM, "Noel Butler" <noel.butler at ausics.net
> <javascript:_e(%7B%7D,'cvml','noel.butler at ausics.net');>> wrote:
>
>> F5's BIG-IP 11.6.0 also vulnerable
>>
>>
>> _______________________________________________
>> AusNOG mailing list
>> AusNOG at lists.ausnog.net
>> <javascript:_e(%7B%7D,'cvml','AusNOG at lists.ausnog.net');>
>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140927/2e2458f2/attachment.html>
More information about the AusNOG
mailing list