On Mon, Aug 18, 2008 at 4:30 AM, Robert Blayzor <[EMAIL PROTECTED]> wrote: > > We've been running 6.3 for years and only after all the recent DNS exploits > did we see this one start hitting us.
> The only way to fix it is to upgrade to 7.x or get the maint/patch train > from TAC. If you have any DNS servers behind your PIX with a lot of clients The page says it's patched in 6.3(5.105) -- is that available only from the TAC? CCO lists just 6.3(5) GD. Forgive my ignorance, but it's been a long time since I've had to get a special file from TAC -- does an end-user have to have smartnet on the device? --Adam _______________________________________________ cisco-nsp mailing list cisco-nsp@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/