<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL with pct in the https service? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssl-with-pct-in-the-https-service/m-p/1931350#M192447</link>
    <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recently, in my organization we ran a vulnerabilty test and&amp;nbsp; the ACS platfomr got this vulnerability&amp;nbsp; &lt;STRONG style="color: #686868; font-size: 12pt; font-family: Arial; "&gt;&lt;STRONG style="color: #686868; font-size: 12pt; font-family: Arial; "&gt;&lt;STRONG style="color: #686868; font-size: 12pt; font-family: Arial; "&gt;ssl-pct1-bo &lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt;basically consist when an application over https run a protocol named ptc that is a library of ssl, this is a potencial risk because it&amp;nbsp; could permit execute a buffer overflow over the machine, but when I look for information about it i found that affects systems over windows O.S. I want to know if this vulnerability could affect my ACS. It is 5.1.0.44.5&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt; version. I know that my acs is based on a linux o.s but i want to know if ptc could be execute altought this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt;Regards.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 01:59:26 GMT</pubDate>
    <dc:creator>jusecas86</dc:creator>
    <dc:date>2019-03-11T01:59:26Z</dc:date>
    <item>
      <title>SSL with pct in the https service?</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-with-pct-in-the-https-service/m-p/1931350#M192447</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recently, in my organization we ran a vulnerabilty test and&amp;nbsp; the ACS platfomr got this vulnerability&amp;nbsp; &lt;STRONG style="color: #686868; font-size: 12pt; font-family: Arial; "&gt;&lt;STRONG style="color: #686868; font-size: 12pt; font-family: Arial; "&gt;&lt;STRONG style="color: #686868; font-size: 12pt; font-family: Arial; "&gt;ssl-pct1-bo &lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt;basically consist when an application over https run a protocol named ptc that is a library of ssl, this is a potencial risk because it&amp;nbsp; could permit execute a buffer overflow over the machine, but when I look for information about it i found that affects systems over windows O.S. I want to know if this vulnerability could affect my ACS. It is 5.1.0.44.5&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt; version. I know that my acs is based on a linux o.s but i want to know if ptc could be execute altought this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt;Regards.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-with-pct-in-the-https-service/m-p/1931350#M192447</guid>
      <dc:creator>jusecas86</dc:creator>
      <dc:date>2019-03-11T01:59:26Z</dc:date>
    </item>
    <item>
      <title>SSL with pct in the https service?</title>
      <link>https://community.cisco.com/t5/network-access-control/ssl-with-pct-in-the-https-service/m-p/1931351#M192460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;EM&gt;Juan,&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ACS does not use MD5 for CSR or self sign cert generation. Option we have is either SHA1 or SHA256.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Regards&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;~JG&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Do rate helpful posts&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 19:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssl-with-pct-in-the-https-service/m-p/1931351#M192460</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2012-04-10T19:01:25Z</dc:date>
    </item>
  </channel>
</rss>

