On Mon, Aug 18, 2008 at 4:30 AM, Robert Blayzor <[EMAIL PROTECTED]> wrote:
>
> We've been running 6.3 for years and only after all the recent DNS exploits
> did we see this one start hitting us.

> The only way to fix it is to upgrade to 7.x or get the maint/patch train
> from TAC.  If you have any DNS servers behind your PIX with a lot of clients

The page says it's patched in 6.3(5.105) -- is that available only
from the TAC?  CCO lists just 6.3(5) GD.
Forgive my ignorance, but it's been a long time since I've had to get
a special file from TAC -- does an end-user have to have smartnet on
the device?

--Adam
_______________________________________________
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Reply via email to