<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IOS Heap-based Overflow Vulnerability in System Timers in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-heap-based-overflow-vulnerability-in-system-timers/m-p/617307#M92078</link>
    <description>&lt;P&gt;I am doing QA on an IOS and I need to verify the following:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/products_security_advisory09186a008055ef31.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/products_security_advisory09186a008055ef31.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tey&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 10:17:10 GMT</pubDate>
    <dc:creator>teyobanilom</dc:creator>
    <dc:date>2019-03-10T10:17:10Z</dc:date>
    <item>
      <title>IOS Heap-based Overflow Vulnerability in System Timers</title>
      <link>https://community.cisco.com/t5/network-security/ios-heap-based-overflow-vulnerability-in-system-timers/m-p/617307#M92078</link>
      <description>&lt;P&gt;I am doing QA on an IOS and I need to verify the following:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/products_security_advisory09186a008055ef31.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/products_security_advisory09186a008055ef31.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tey&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-heap-based-overflow-vulnerability-in-system-timers/m-p/617307#M92078</guid>
      <dc:creator>teyobanilom</dc:creator>
      <dc:date>2019-03-10T10:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Heap-based Overflow Vulnerability in System Timers</title>
      <link>https://community.cisco.com/t5/network-security/ios-heap-based-overflow-vulnerability-in-system-timers/m-p/617308#M92079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;2651XM  router  using 12.3(9),  the vulnerability is fixed in 12.3(9e) &lt;/P&gt;&lt;P&gt;7200VXR router using 12.3(12a)fc3 , fixed is in 12.3(12e)&lt;/P&gt;&lt;P&gt;It would be best if you could just upgrade both to 12.3(16). &lt;/P&gt;&lt;P&gt;if you have a valid CCO, you should be able to download the IOS from the site. You just need to select the platform, the 12.3(16) release and the feature set. The feature set that you will use must be the same as the current feature set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Oct 2006 22:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-heap-based-overflow-vulnerability-in-system-timers/m-p/617308#M92079</guid>
      <dc:creator>a-vazquez</dc:creator>
      <dc:date>2006-10-20T22:36:18Z</dc:date>
    </item>
  </channel>
</rss>

