<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: acs for windows buffer overflow vulnerability in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-for-windows-buffer-overflow-vulnerability/m-p/201604#M439222</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also have questions - I am currently running versio 3.0 2.5) of ACS server - &lt;/P&gt;&lt;P&gt;do I need to upgrade ?&lt;/P&gt;&lt;P&gt;if so to ehat version ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 Apr 2003 11:05:06 GMT</pubDate>
    <dc:creator>poppj</dc:creator>
    <dc:date>2003-04-29T11:05:06Z</dc:date>
    <item>
      <title>acs for windows buffer overflow vulnerability</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-for-windows-buffer-overflow-vulnerability/m-p/201602#M439220</link>
      <description>&lt;P&gt;With regards to the recent discovery of the above mentioned vulnerability, i am running acs v3.0 and will need to upgrade to v3.04. Is it possible to upgrade directly from v3.0 to v3.4.&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;mark weaver&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 14:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-for-windows-buffer-overflow-vulnerability/m-p/201602#M439220</guid>
      <dc:creator>mark.weaver</dc:creator>
      <dc:date>2019-03-10T14:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: acs for windows buffer overflow vulnerability</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-for-windows-buffer-overflow-vulnerability/m-p/201603#M439221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good question.  My experience is that yes you can.  However, I also have question for method of roll-back in case there are additional problems with 3.04&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2003 14:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-for-windows-buffer-overflow-vulnerability/m-p/201603#M439221</guid>
      <dc:creator>pallette</dc:creator>
      <dc:date>2003-04-28T14:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: acs for windows buffer overflow vulnerability</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-for-windows-buffer-overflow-vulnerability/m-p/201604#M439222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also have questions - I am currently running versio 3.0 2.5) of ACS server - &lt;/P&gt;&lt;P&gt;do I need to upgrade ?&lt;/P&gt;&lt;P&gt;if so to ehat version ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Apr 2003 11:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-for-windows-buffer-overflow-vulnerability/m-p/201604#M439222</guid>
      <dc:creator>poppj</dc:creator>
      <dc:date>2003-04-29T11:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: acs for windows buffer overflow vulnerability</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-for-windows-buffer-overflow-vulnerability/m-p/201605#M439223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check out the link below, that is where i got my information from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/707/cisco-sa-20030423-ACS.shtml" target="_blank"&gt;http://www.cisco.com/warp/public/707/cisco-sa-20030423-ACS.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Apr 2003 11:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-for-windows-buffer-overflow-vulnerability/m-p/201605#M439223</guid>
      <dc:creator>mark.weaver</dc:creator>
      <dc:date>2003-04-29T11:19:39Z</dc:date>
    </item>
  </channel>
</rss>

