Here we had to upgrade our JuniperĀ“s router because of these exploit.
Juniper advertised all customers to update asap.

Gustavo Santos
Analista de Redes
CCNA , MTCNA , MTCRE, MTCINE, JUNCIA-ER


2013/2/7 Jeremy L. Gaddis <jer...@as54225.net>

> * Matt Hoppes <mhop...@indigowireless.com> wrote:
> > Did anyone else see an explosion on the Level3 network this morning?
> > They've been up and down all morning since around 2:30 eastern time...
> > just recovered recently.
>
> >From the e-mail notification I received from Level 3 (~13 hours before
> the start of the maintenance window):
>
> "Emergency Maintenance Advisement - This maintenance is scheduled."
>
> ... and ...
>
> "Level 3 Communications will perform a mandatory network upgrade that
> will be service impacting and will impact devices in multiple locations.
> We are upgrading the code on portions of the global network to increase
> stability for the overall network. During this maintenance activity
> customers may be impacted for approximately 30 minutes."
>
> My own guess is that they wanted to quickly get their gear upgraded so
> that they weren't caught with their pants down like the last time such a
> vulnerability was announced. In that case, someone posted (previously
> unknown) exploit details to the full-disclosure mailing list, forcing
> many to to delay patching any longer:
>
>   http://seclists.org/fulldisclosure/2010/Jan/136
>
> On a side note: if you ever want to receive a ton of hate mail from
> engineers at large companies and telcos, that's a good way to do it.
>
> --
> Jeremy L. Gaddis           e: jer...@as54225.net
> Network Engineer           m: +1.812.865.0581
>
>
> _______________________________________________
> Wireless mailing list
> Wireless@wispa.org
> http://lists.wispa.org/mailman/listinfo/wireless
>
_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless

Reply via email to