[AusNOG] bash bug !
Tim Sheahan
sheahant at mytelecom.com.au
Sat Sep 27 12:38:53 EST 2014
If even the author of the firmware said this to me, I would wonder if he
really had looked hard enough for attack vectors.
Reports all say they are working to identify more of the surface area
for this attack, any listening IP port (perhaps even some outgoing
connections to a malicious and cleverly written endpoint?) would be a
candidate.
- Tim Sheahan
On 27/09/2014 12:31 PM, Chris Barnes wrote:
>
> Do you have anymore info on this?
>
> The integrator who supports my F5s told me only the management
> interface is vulnerable, public facing interfaces aren't.
>
> Not entirely convinced.
>
> --
> Kind Regards,
>
> Christopher Barnes
>
> e. chris.p.barnes at gmail.com <mailto:chris.p.barnes at gmail.com>
>
> On 27/09/2014 12:25 PM, "Noel Butler" <noel.butler at ausics.net
> <mailto:noel.butler at ausics.net>> wrote:
>
> F5's BIG-IP 11.6.0 also vulnerable
>
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net <mailto:AusNOG at lists.ausnog.net>
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140927/52018d7b/attachment.html>
More information about the AusNOG
mailing list