<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi onslaught99, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/extrabacon-vulnerability/m-p/2954591#M155650</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/onslaught99" title="View user profile." class="username" lang="" about="/users/onslaught99" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;onslaught99&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Actually on the Cisco Security Advisory for Extrabacon the 9.6.2 shows up as fixed:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;H2&gt;Fixed Releases&lt;/H2&gt;
&lt;DIV class="tblScroller"&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Cisco ASA Major Release&lt;/STRONG&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;First Fixed Release&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;7.2&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;8.0&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.1&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.2&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.3&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.4&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.5&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.6&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.7&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.0&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.0.4%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;9.0.4(40)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.1&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.1.7%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;9.1.7(9)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.2&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.2.4%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;9.2.4(14)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.3&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.3.3%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;9.3.3(10)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.4&lt;/TD&gt;
&lt;TD&gt;9.4.3(8) ETA 8/26/2016&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.5&lt;/TD&gt;
&lt;TD&gt;9.5(3) ETA 8/30/2016&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.6 (FTD)&lt;/TD&gt;
&lt;TD&gt;9.6.1(11) / FTD 6.0.1(2)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;9.6 (ASA)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.6.2" style="color: #ff0000;"&gt;9.6.2&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this info helps!!&lt;/P&gt;
&lt;P&gt;Rate if helps you!!&lt;/P&gt;
&lt;P&gt;-JP-&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 26 Aug 2016 02:05:37 GMT</pubDate>
    <dc:creator>JP Miranda Z</dc:creator>
    <dc:date>2016-08-26T02:05:37Z</dc:date>
    <item>
      <title>Extrabacon Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/extrabacon-vulnerability/m-p/2954590#M155649</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I saw that they revised the security notice for the SNMP vulnerability and listed the fixed software. I saw that 9.6.1(11) fixes this vulnerability but I only see (10) listed in the software downloads. I also noticed that Cisco has 9.6(2) released as of 8/24 but was curious if that version remedies the SNMP vulnerability as well. I reviewed the release notes and there is no mention of the SNMP vulnerability, at least that I can find. Can someone confirm that 9.6(2) fixes the SNMP vulnerability?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:11:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/extrabacon-vulnerability/m-p/2954590#M155649</guid>
      <dc:creator>onslaught99</dc:creator>
      <dc:date>2019-03-12T08:11:28Z</dc:date>
    </item>
    <item>
      <title>Hi onslaught99,</title>
      <link>https://community.cisco.com/t5/network-security/extrabacon-vulnerability/m-p/2954591#M155650</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/onslaught99" title="View user profile." class="username" lang="" about="/users/onslaught99" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;onslaught99&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Actually on the Cisco Security Advisory for Extrabacon the 9.6.2 shows up as fixed:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;H2&gt;Fixed Releases&lt;/H2&gt;
&lt;DIV class="tblScroller"&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Cisco ASA Major Release&lt;/STRONG&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;First Fixed Release&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;7.2&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;8.0&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.1&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.2&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.3&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.4&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.5&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.6&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.7&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1.7(9) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.0&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.0.4%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;9.0.4(40)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.1&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.1.7%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;9.1.7(9)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.2&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.2.4%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;9.2.4(14)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.3&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.3.3%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;9.3.3(10)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.4&lt;/TD&gt;
&lt;TD&gt;9.4.3(8) ETA 8/26/2016&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.5&lt;/TD&gt;
&lt;TD&gt;9.5(3) ETA 8/30/2016&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.6 (FTD)&lt;/TD&gt;
&lt;TD&gt;9.6.1(11) / FTD 6.0.1(2)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;9.6 (ASA)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143092&amp;amp;flowid=31542&amp;amp;softwareid=280775065&amp;amp;release=9.6.2" style="color: #ff0000;"&gt;9.6.2&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this info helps!!&lt;/P&gt;
&lt;P&gt;Rate if helps you!!&lt;/P&gt;
&lt;P&gt;-JP-&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 26 Aug 2016 02:05:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/extrabacon-vulnerability/m-p/2954591#M155650</guid>
      <dc:creator>JP Miranda Z</dc:creator>
      <dc:date>2016-08-26T02:05:37Z</dc:date>
    </item>
    <item>
      <title>Good point JP - although to</title>
      <link>https://community.cisco.com/t5/network-security/extrabacon-vulnerability/m-p/2954592#M155651</link>
      <description>&lt;P&gt;Good point JP - although to be fair, that was updated after onslaught99 posted this morning.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 03:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/extrabacon-vulnerability/m-p/2954592#M155651</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-08-26T03:20:14Z</dc:date>
    </item>
  </channel>
</rss>

