07-10-2003 07:53 AM - edited 03-02-2019 08:46 AM
Hi,
Abou this advisory:
http://www.cisco.com/warp/public/707/cisco-sa-20030709-swtcp.shtml
Is the Catalyst 6500 (CatOS 6.3(3) affected for this vulnerability ?
regards.
07-10-2003 07:55 AM
Yes it is.
6.3(6) and later has fix in 6.x. 6.4(4a) which is a GD should be a good release to run
07-10-2003 08:00 AM
OK, thanks for your soon answer.
regards.
07-10-2003 08:16 AM
Out of interest, where can I find which CatOS releases are GD? For example, is 6.4(3), having recently upgraded to the latest 6.4 release at the time to support SRM.
07-10-2003 08:55 AM
07-10-2003 09:37 AM
Thanks, but from the URL, it looks like this is just for Partner access; ordinary end-user CCO access doesn't appear to be sufficient. :(
07-10-2003 09:41 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide