<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX and OpenSSH Security buffer.adv advisory in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-and-openssh-security-buffer-adv-advisory/m-p/147719#M580321</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;None of the PIX, FWSM, IOS, VPN3000, VPN5000 or CatOS SSH code is based on OpenSSH code, and therefore is NOT susceptible to the latest vulnerability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure on the IDS code as yet, we're still checking into it.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd keep checking here (&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/707/advisory.html" target="_blank"&gt;http://www.cisco.com/warp/public/707/advisory.html&lt;/A&gt;) if you're interested, when we know more I'd say we'll release an announcement here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Sep 2003 03:33:29 GMT</pubDate>
    <dc:creator>gfullage</dc:creator>
    <dc:date>2003-09-17T03:33:29Z</dc:date>
    <item>
      <title>PIX and OpenSSH Security buffer.adv advisory</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-openssh-security-buffer-adv-advisory/m-p/147718#M580314</link>
      <description>&lt;P&gt;Are any of the PIX OS versions susceptible to the latest OpenSSH Security buffer.adv advisory?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.openssh.com/txt/buffer.adv" target="_blank"&gt;http://www.openssh.com/txt/buffer.adv&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-openssh-security-buffer-adv-advisory/m-p/147718#M580314</guid>
      <dc:creator>david</dc:creator>
      <dc:date>2020-02-21T06:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and OpenSSH Security buffer.adv advisory</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-openssh-security-buffer-adv-advisory/m-p/147719#M580321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;None of the PIX, FWSM, IOS, VPN3000, VPN5000 or CatOS SSH code is based on OpenSSH code, and therefore is NOT susceptible to the latest vulnerability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure on the IDS code as yet, we're still checking into it.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd keep checking here (&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/707/advisory.html" target="_blank"&gt;http://www.cisco.com/warp/public/707/advisory.html&lt;/A&gt;) if you're interested, when we know more I'd say we'll release an announcement here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Sep 2003 03:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-openssh-security-buffer-adv-advisory/m-p/147719#M580321</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2003-09-17T03:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and OpenSSH Security buffer.adv advisory</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-openssh-security-buffer-adv-advisory/m-p/147720#M580328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CatOS is susceptible, PIX is not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/707/cisco-sa-20030917-openssh.shtml" target="_blank"&gt;http://www.cisco.com/warp/public/707/cisco-sa-20030917-openssh.shtml&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following products, have their SSH server implementation based on the OpenSSH code, and are affected by the OpenSSH vulnerabilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     * Cisco Catalyst Switching Software (CatOS)&lt;/P&gt;&lt;P&gt;     * CiscoWorks 1105 Hosting Solution Engine (HSE)&lt;/P&gt;&lt;P&gt;     * CiscoWorks 1105 Wireless LAN Solution Engine (WLSE)&lt;/P&gt;&lt;P&gt;     * Cisco SN 5428 Storage Router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;       Vulnerable versions are:&lt;/P&gt;&lt;P&gt;          * SN5428-2.5.1-K9&lt;/P&gt;&lt;P&gt;          * SN5428-3.2.1-K9&lt;/P&gt;&lt;P&gt;          * SN5428-3.2.2-K9&lt;/P&gt;&lt;P&gt;          * SN5428-3.3.1-K9&lt;/P&gt;&lt;P&gt;          * SN5428-3.3.2-K9&lt;/P&gt;&lt;P&gt;          * SN5428-2-3.3.1-K9&lt;/P&gt;&lt;P&gt;          * SN5428-2-3.3.2-K9&lt;/P&gt;&lt;P&gt;   This does not include release sr2122-3.1.1-K9, which only contains SSL and no SSH. Cisco has not released code with SSH for the SN5420 storage router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   The following products, which incorporate a SSH server, have been confirmed to be not vulnerable to the OpenSSH vulnerabilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     * Cisco IOS, both SSH version 1.5 and SSH version 2.0&lt;/P&gt;&lt;P&gt;     * Cisco PIX Firewall&lt;/P&gt;&lt;P&gt;     * Cisco Catalyst 6000 FireWall Service Module (FWSM)&lt;/P&gt;&lt;P&gt;     * Cisco VPN3000 and Cisco VPN5000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   No other Cisco products are currently known to be affected by these vulnerabilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Sep 2003 09:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-openssh-security-buffer-adv-advisory/m-p/147720#M580328</guid>
      <dc:creator>Solace</dc:creator>
      <dc:date>2003-09-18T09:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and OpenSSH Security buffer.adv advisory</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-openssh-security-buffer-adv-advisory/m-p/147721#M580332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to clarify:&lt;/P&gt;&lt;P&gt;The CSIDS appliance is vulnerable (as per the updated advisory, and my own testing), but the IDSM is not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Sep 2003 16:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-openssh-security-buffer-adv-advisory/m-p/147721#M580332</guid>
      <dc:creator>rcarskadden</dc:creator>
      <dc:date>2003-09-18T16:52:21Z</dc:date>
    </item>
  </channel>
</rss>

