[Full-Disclosure] SuSE Security Announcement: pine (SuSE-SA:2002:046)
-BEGIN PGP SIGNED MESSAGE- __ SuSE Security Announcement Package:pine Announcement-ID:SuSE-SA:2002:046 Date: Monday, Nov 25th 2002 10:30 MEST Affected products: 7.1, 7.2, 7.3, 8.0, 8.1 SuSE Linux Database Server SuSE eMail Server 3.1 SuSE eMail Server III SuSE Firewall Adminhost VPN SuSE Linux Admin-CD for Firewall SuSE Firewall on CD 2 - VPN SuSE Firewall on CD 2 SuSE Linux Enterprise Server for S/390 SuSE Linux Connectivity Server SuSE Linux Enterprise Server 7 for IA32 SuSE Linux Office Server Vulnerability Type: remote denial-of-service Severity (1-10):4 SuSE default package: yes (7.1 - 8.0) no (8.1) Cross References: none Content of this advisory: 1) security vulnerability resolved: - heap buffer overflow while parsing mail address problem description, discussion, solution and upgrade information 2) pending vulnerabilities, solutions, workarounds: - sparc distribution - WindowMaker 3) standard appendix (further information) __ 1) problem description, brief discussion, solution, upgrade information Pine, Program for Internet News and Email, is a well known and widely used eMail client. While parsing and escaping characters of eMail addresses pine does not allocate enough memory for storing the escaped mailbox part of an address. This results in a buffer overflow on the heap that will make pine crash. The offending eMail can just be deleted manually or by using another mail user agent. A possible temporary workaround is to filter the respective header lines by a mail delivery agent (such as procmail). Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement. Then, install the package using the command rpm -Fhv file.rpm to apply the update. Our maintenance customers are being notified individually. The packages are being offered to install from the maintenance web. Intel i386 Platform: SuSE-8.1: ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/pine-4.44-224.i586.rpm 8c32d5571d7488e31f693a884dedb81e patch rpm(s): ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/pine-4.44-224.i586.patch.rpm 467b8b318958b0ead3f30fa7b1f5a9a0 source rpm(s): ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/pine-4.44-224.src.rpm 9b1ff436719cf9752cda3ddd711e80a7 SuSE-8.0: ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/pine-4.44-222.i386.rpm 01d9e82164a5ce4037b84be1b2ed4228 patch rpm(s): ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/pine-4.44-222.i386.patch.rpm 162c4265909af7805f7aeaf3e12e8763 source rpm(s): ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/pine-4.44-222.src.rpm d724e02b1ea3783e5bfb01ae9728d7cf SuSE-7.3: ftp://ftp.suse.com/pub/suse/i386/update/7.3/n1/pine-4.33-266.i386.rpm 140c58adf7d0b2113d5b20de67e2 source rpm(s): ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/pine-4.33-266.src.rpm 100c86e88ce357b0efacf7dfe2ab592c SuSE-7.2: ftp://ftp.suse.com/pub/suse/i386/update/7.2/n1/pine-4.33-266.i386.rpm bd44232250b3def07cab81064dad11f2 source rpm(s): ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/pine-4.33-266.src.rpm e28daa1f2d66135fcf5951c9b2dc19be SuSE-7.1: ftp://ftp.suse.com/pub/suse/i386/update/7.1/n1/pine-4.33-263.i386.rpm 9bdd3394336a786b0711b8e98ab4a268 source rpm(s): ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/pine-4.33-263.src.rpm 630478b751a24e86c52fe645be9365c4 Sparc Platform: SuSE-7.3: ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n1/pine-4.33-97.sparc.rpm 5187b311c27f043178a12ae186d228a6 source rpm(s): ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/pine-4.33-97.src.rpm 9616303edadfd899785f3ac12d2dc02a AXP Alpha Platform: SuSE-7.1: ftp://ftp.suse.com/pub/suse/axp/update/7.1/n1/pine-4.33-85.alpha.rpm f5155d79236e3ec15c463f586f731c17 source rpm(s): ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/pine-4.33-85.src.rpm 75365b21b97c8a2f722d95491f62d305 PPC Power PC Platform: SuSE-7.3:
Re: [Full-Disclosure] [PHC] Sermon #3 (w/ reply to Paul Schmehl others)
- Original Message - From: Euan Briggs [EMAIL PROTECTED] Date: Sat, 23 Nov 2002 00:52:30 -0500 To: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] [PHC] Sermon #3 (w/ reply to Paul Schmehl others) Sorry to tell you this PHC, but I know who the majority of you are and where you originate from. OMG NO!!! does this mean that my real identity as a transvestite cross-gendered ex-felon stripper who never originated from boston but really comes from a shell that was hatched in the ocean deep has been made public?! oh the embarassment!!! how will the hacker world ever take me seriously again!?! mr euan briggs, PHC isn't just the #phrack@EFnet ops. there are members of PHC who aren't opped on #phrack, some who don't even visit the channel. some who dont even bother with irc like you and i do. but seriously, i'd like to know what you know about me, and where i originate from. i'm comfortable with you revealing this to the list or anywhere else for that matter. my identity is hardly something of a secret these days, but i'm fairly certain you remain without any clue. My work with Snosoft does not mark my entry into the field. To be frank, the reason I entered the whitehat arena, is because I am appalled at what has happened to the blackhat scene. I am appalled by the motives and attitudes of people such as PHC. I am appalled by the behaviour of people like you. I have a conscience and a sense of responsibility, towards my fellow human beings and our society. I want the world to be a better place. I don't see working for the security industry as some sort of betrayal of my blackhat roots, I see it as making a -positive- contribution to society. I see it as paying my debt to society, for the years I spent as a blackhat. Entering the industry was a natural progression. I dont get a kick out of crime, it only brings guilt and it is a rejection of the society that nurtured you, human society which you owe your life to. if this is the case then what have you actually done about it? you constantly whine and gripe about how #phrack is so bad and evil and omg stop them!! but so far your actions to stop #phrack have amounted to zilch, nada, nothing. if you are so eager to talk about how great you are and how right you are, then why not give us some evidence as to why we should believe you. if you're not prepared to show evidence of malicious activities against #phrack or anyone else then shut up about your blackhat roots and your debt to society. i doubt you ever were a blackhat, as you have consistantly shown a lack of skill to back up the lies you tell. You claim to hate the security industry, because you believe they are exploiting hackers and their world. Unless you yourselfs are genuinely being exploited, I would say this part of your rather contradictory manifesto its nothing more than a thin veneer of justification for your delinquent attitudes. As I said in my last post, I think you are just pissed off that you have a motivated and well funded competitor (the industry), and people like you helped create it. *snip* i cant speak for everyone who's against the security industry, just myself. so far my ideology in this whole mess has evolved. as i expanded my investigation into what the problem actually is, i realised that the term anti-security industry didn't really fit me, as i was more about changing the current system for the better... not the worse. like you and just about everyone else on this list i feel a degree of social responsibility when it comes to the matter. but unlike yourself i am not so resistant to change, and the cost of that change. we're learning as we go along here, just like anyone else. plz dont take words that were uttered in the heat of spirited patriotism to be the basis of our arguments. *snap* You claim to be advocating non-disclosure because you believe it will increase security, yet at the same time you claim to be blackhat (implication = criminal) hackers. It doesnt add up. *sigh* i've tried to explain this so many times before. yet again i attempt to simplify everything without making too broad an assumption... yet again do i explain this: blackhat ~= person who advocates non-disclosure. hacks computers. doesn't brag security ~= the likelihood of a system withstanding an attack. at the moment many many ppl have ready access to information on how to compromise security. but a person can only secure their own system. this means that many ppl pose a security risk that few ppl can actually manage. (strong offence versus weak defence) non-disclosure solves this problem. if fewer ppl know about hacks (because blackhats dont talk about them) then fewer systems are threatened because the ratio of attackers:admins is reduced. PLEASE, try and think about it for yourself instead of trying to find all the faults in what i've said. just take a good look with an open and rational mind and work it out for yourself, it will
RE: [Full-Disclosure] PHC replies to criticism
Why don't you PHC freaks get a life. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of [EMAIL PROTECTED] Sent: Sunday, November 24, 2002 6:16 PM To: [EMAIL PROTECTED] Subject: [Full-Disclosure] PHC replies to criticism -BEGIN PGP SIGNED MESSAGE- Hello, In response to Len's administrivia... We have decided to avoid self-defeating personal vendettas on this list and focus on those critics of PHC who possess the ability to think clearly and make cogent arguments. Such critics include Paul Schmehl and Steve Manzuik, perhaps the only critics on this list who have displayed clarity of thought and the ability to make logical and relevant arguments against what we have said. No names will be mentioned here, but we will be ignoring the following classes of people: 1. Those paranoid schizophrenics who make outlandish conspiracy theory claims suggesting that PHC is a government project or that PHC has been influenced by the government. We're not sure if these people are serious, but anyway. The meds aren't meant to taste good. 2. Those weak-minded individuals who, as we have mentioned in a previous sermon, resort to nothing but ad hominem attacks such as lamers, scriptkids, newbies, and so on -- attacks they can't back up with evidence when challenged, i.e. they ignore the challenge totally and throw out further unsubstantiated, vaporous drivel. This makes them look like stubborn intellectual midgets who are capable of nothing except baseless monologues. 3. Those people unable to focus on the points raised, but instead choose to go off on a tangent with their self-promotional rants about how they are reformed blackhats and such. The transparency of these people in their job hunting process is truly laughable. This is a really silly thing to note here, but one of these individuals who has been online since 1994 has called PHC fresh bloods, when in actual fact the majority of PHC has been online since before then, as is clearly evident to anyone who researches old ezine releases and knows enough about PHC to make accurate connections. As if time online necessarily relates to skillz or other irrelevant crap, anyway. 4. People sending in narc logs that have been floating around for a long time, not realizing that they are actually doing us a favour in vindicating us of terrorism motives. Well, OK, we will mention one name: the fake 'nwonknu' who also appears to be the fake 'shiftee'. Do what you may, but you are welcome to email us and express your grievances against us. Don't read into this as a passive assimilation tactic, though. As an exercise to the reader, see if you can classify the expected replies to this post based on the classes outlined above. The person who posts the most accurate classification attempt will be awarded op status in #phrack (yay). PHC -BEGIN PGP SIGNATURE- Version: Hush 2.2 (Java) Note: This signature can be verified at https://www.hushtools.com/verify wlgEARECABgFAj3hX/QRHHBoY0BodXNobWFpbC5jb20ACgkQ0rw64nEc6GLidwCeIdQD vrHFRPAGR199hHQGOJ6c07cAoJjD4BnslhqHtTdj7GWDykpKI70X =ohf1 -END PGP SIGNATURE- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
[Full-Disclosure] MDKSA-2002:081 - Updated samba packages fix potential root compromise
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: samba Advisory ID:MDKSA-2002:081 Date: November 25th, 2002 Affected versions: 8.1, 8.2, 9.0 Problem Description: A vulnerability in samba versions 2.2.2 through 2.2.6 was discovered by the Debian samba maintainers. A bug in the length checking for encrypted password change requests from clients could be exploited using a buffer overrun attack on the smbd stack. This attack would have to crafted in such a way that converting a DOS codepage string to little endian UCS2 unicode would translate into an executable block of code. This vulnerability has been fixed in samba version 2.2.7, and the updated packages have had a patch applied to fix the problem. References: http://www.samba.org/samba/whatsnew/samba-2.2.7.html Updated Packages: Mandrake Linux 8.1: b10451e71a1ba27d45956f57fb203118 8.1/RPMS/samba-2.2.2-3.3mdk.i586.rpm 22a6f9977518bbe2923ec7d2f68a698e 8.1/RPMS/samba-client-2.2.2-3.3mdk.i586.rpm 74d59e5578aaa0a23e760c828a6d8688 8.1/RPMS/samba-common-2.2.2-3.3mdk.i586.rpm 6d6a2835fd6e21b4c93dbaa5fe6f2d13 8.1/RPMS/samba-doc-2.2.2-3.3mdk.i586.rpm 4c7511781a263f633cab5bf1831ad69b 8.1/SRPMS/samba-2.2.2-3.3mdk.src.rpm Mandrake Linux 8.1/IA64: 2456e2af90d2e71e877a16f2ff034c73 ia64/8.1/RPMS/samba-2.2.2-3.3mdk.ia64.rpm 66043b111988d82d2800763950ea07e3 ia64/8.1/RPMS/samba-client-2.2.2-3.3mdk.ia64.rpm 6954d750eae921eece5e1e2ece9c42e5 ia64/8.1/RPMS/samba-common-2.2.2-3.3mdk.ia64.rpm cf5545988b8d07299b776a25d6dc2e56 ia64/8.1/RPMS/samba-doc-2.2.2-3.3mdk.ia64.rpm 4c7511781a263f633cab5bf1831ad69b ia64/8.1/SRPMS/samba-2.2.2-3.3mdk.src.rpm Mandrake Linux 8.2: 5552fadd8509fc7222099f88dad0f5a9 8.2/RPMS/nss_wins-2.2.3a-10.1mdk.i586.rpm 58da182a9a84a02010ddaf939e97bc7c 8.2/RPMS/samba-2.2.3a-10.1mdk.i586.rpm 91dcff33758dca1ca9a4779186a6917d 8.2/RPMS/samba-client-2.2.3a-10.1mdk.i586.rpm ce98076728c73ca79b78fc9d69b94b47 8.2/RPMS/samba-common-2.2.3a-10.1mdk.i586.rpm 983c2de083b240971026bb054b449fde 8.2/RPMS/samba-doc-2.2.3a-10.1mdk.i586.rpm fe4c7a8ebedede8ac10ff98eac2b84a5 8.2/RPMS/samba-swat-2.2.3a-10.1mdk.i586.rpm ec00eed80e135dd79b56608bbd2c0574 8.2/RPMS/samba-winbind-2.2.3a-10.1mdk.i586.rpm 5677dee51659f50acee4e55346ca737d 8.2/SRPMS/samba-2.2.3a-10.1mdk.src.rpm Mandrake Linux 8.2/PPC: 32e41a8c06f1b5b24b13de0f65dfa3cc ppc/8.2/RPMS/nss_wins-2.2.3a-10.1mdk.ppc.rpm 275bf7b8a2792e11bf94dc24557f8ebc ppc/8.2/RPMS/samba-2.2.3a-10.1mdk.ppc.rpm 66232f77afcacc83090e3cf848717962 ppc/8.2/RPMS/samba-client-2.2.3a-10.1mdk.ppc.rpm 912ccb4cc81f89de6de871aa1c4833c0 ppc/8.2/RPMS/samba-common-2.2.3a-10.1mdk.ppc.rpm af73612d4ea52c4a391ca75afd0dae8b ppc/8.2/RPMS/samba-doc-2.2.3a-10.1mdk.ppc.rpm 2117cd7af96f6467c867faef73a425b6 ppc/8.2/RPMS/samba-swat-2.2.3a-10.1mdk.ppc.rpm ab0402b7173a04be1cbc6c415807b98a ppc/8.2/RPMS/samba-winbind-2.2.3a-10.1mdk.ppc.rpm 5677dee51659f50acee4e55346ca737d ppc/8.2/SRPMS/samba-2.2.3a-10.1mdk.src.rpm Mandrake Linux 9.0: 25b264e1b5ee43b26d861f5b5e07d7d2 9.0/RPMS/nss_wins-2.2.7-2.1mdk.i586.rpm 619a0506a84d25099ca0653be0f5fd3a 9.0/RPMS/samba-client-2.2.7-2.1mdk.i586.rpm d7ed710067f71285cc616fe07efd7753 9.0/RPMS/samba-common-2.2.7-2.1mdk.i586.rpm 2b5667097a398ef87e9e721c26bb613b 9.0/RPMS/samba-doc-2.2.7-2.1mdk.i586.rpm ff124b4103dd84e51f5be82dd9244b1f 9.0/RPMS/samba-server-2.2.7-2.1mdk.i586.rpm a7b976a81f59d7ce7111cb5f44d89bcd 9.0/RPMS/samba-swat-2.2.7-2.1mdk.i586.rpm 0859d8665e9d2ea2f1f96365a7456e3f 9.0/RPMS/samba-winbind-2.2.7-2.1mdk.i586.rpm b93cd8ca9319a628ee7015bbd5d2196e 9.0/SRPMS/samba-2.2.7-2.1mdk.src.rpm Bug IDs fixed (see https://qa.mandrakesoft.com for more information): To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with rpm -Fvh *.rpm. A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig filename All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team from:
[Full-Disclosure] MDKSA-2002:082 - Updated python packages fix local arbitrary code execution vulnerability
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: python Advisory ID:MDKSA-2002:082 Date: November 25th, 2002 Affected versions: 7.2, 8.0, 8.1, 8.2, 9.0, Single Network Firewall 7.2 Problem Description: A vulnerability was discovered in python by Zack Weinberg in the way that the execvpe() method from the os.py module uses a temporary file name. The file is created in an unsafe manner and execvpe() tries to execute it, which can be used by a local attacker to execute arbitrary code with the privilege of the user running the python code that is using this method. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1119 http://mail.python.org/pipermail/python-dev/2002-August/027223.html http://python.org/sf/590294 Updated Packages: Linux-Mandrake 7.2: e9e016b6b07fc58997f02b78b299f105 7.2/RPMS/python-1.5.2-12.1mdk.i586.rpm f08129c7b43de40eb712b0a7d4a5554e 7.2/RPMS/python-devel-1.5.2-12.1mdk.i586.rpm 0e59d9f64e6f8be19f4e2dc73a2b2090 7.2/RPMS/python-docs-1.5.2-12.1mdk.i586.rpm d969562e109022071cf69515cf9146b9 7.2/RPMS/tkinter-1.5.2-12.1mdk.i586.rpm 411eb33a72870ba125b7331ab9f077a4 7.2/SRPMS/python-1.5.2-12.1mdk.src.rpm Mandrake Linux 8.0: 9e9c147b6260b731016be16837d2cd09 8.0/RPMS/python-2.0-9.1mdk.i586.rpm c3a0d50a5c4ef7fd374c9e7614c9a0c6 8.0/RPMS/python-devel-2.0-9.1mdk.i586.rpm c7c31e4986334484d470066b6c2db346 8.0/RPMS/python-docs-2.0-9.1mdk.i586.rpm 69a2f2e7d10fb885592d7b4943dcac61 8.0/RPMS/tkinter-2.0-9.1mdk.i586.rpm c24d21f1d7e7e454c2ce78d2ce84a015 8.0/SRPMS/python-2.0-9.1mdk.src.rpm Mandrake Linux 8.0/PPC: 8c35df120638c62d47f586d4faf702d4 ppc/8.0/RPMS/python-2.0-9.1mdk.ppc.rpm 4d54961b8e8cdc301719f42855c6e45c ppc/8.0/RPMS/python-devel-2.0-9.1mdk.ppc.rpm d9943638bf6d8ff59950faef4a832c48 ppc/8.0/RPMS/python-docs-2.0-9.1mdk.ppc.rpm 5f57afb7e9d2042200e8ecd84e83143e ppc/8.0/RPMS/tkinter-2.0-9.1mdk.ppc.rpm c24d21f1d7e7e454c2ce78d2ce84a015 ppc/8.0/SRPMS/python-2.0-9.1mdk.src.rpm Mandrake Linux 8.1: 47695f02d722a8a7393af449a556fcc7 8.1/RPMS/libpython2.2-2.2-9.1mdk.i586.rpm 3fcb8dfd92f1dfaa076a95f227fee87c 8.1/RPMS/libpython2.2-devel-2.2-9.1mdk.i586.rpm 0f2f801268d9348f93c67a96d4d0f9d7 8.1/RPMS/python-2.2-9.1mdk.i586.rpm b69396894c2575949718df77d781 8.1/RPMS/python-base-2.2-9.1mdk.i586.rpm 81ab8ba9cd85b0bea9029aac3ed0d652 8.1/RPMS/python-docs-2.2-9.1mdk.i586.rpm 339191d1e03b5961cc625d2e4996f15f 8.1/RPMS/tkinter-2.2-9.1mdk.i586.rpm d1ac7fa2119ec7c84d408027d44f8525 8.1/SRPMS/python-2.2-9.1mdk.src.rpm Mandrake Linux 8.1/IA64: f27d9c351d9a74b5ea431956b33796af ia64/8.1/RPMS/libpython2.2-2.2-9.1mdk.ia64.rpm ccc514a11b7906c2ca2a3d32b63cf85b ia64/8.1/RPMS/libpython2.2-devel-2.2-9.1mdk.ia64.rpm b80f7653eb52b8de5bcd1eac9b39a882 ia64/8.1/RPMS/python-2.2-9.1mdk.ia64.rpm 68e4333b0ab080c7bf441728d1f96544 ia64/8.1/RPMS/python-base-2.2-9.1mdk.ia64.rpm 6915e488de60562b3728fe7e476fd9a8 ia64/8.1/RPMS/python-docs-2.2-9.1mdk.ia64.rpm d1ac7fa2119ec7c84d408027d44f8525 ia64/8.1/SRPMS/python-2.2-9.1mdk.src.rpm Mandrake Linux 8.2: 22771586df09a081fdd8c00b84a01611 8.2/RPMS/libpython2.2-2.2-9.1mdk.i586.rpm 4649b5d23aeb0a0868c21a0950ef6166 8.2/RPMS/libpython2.2-devel-2.2-9.1mdk.i586.rpm 1aa805b1f870bcb8e042def0d1011719 8.2/RPMS/python-2.2-9.1mdk.i586.rpm 3adaec8a682f16962ba52c984fd6270c 8.2/RPMS/python-base-2.2-9.1mdk.i586.rpm 137abe1f02e02e89bf2b635b76d07892 8.2/RPMS/python-docs-2.2-9.1mdk.i586.rpm 107a60f5b00f477514038459801d156d 8.2/RPMS/tkinter-2.2-9.1mdk.i586.rpm d1ac7fa2119ec7c84d408027d44f8525 8.2/SRPMS/python-2.2-9.1mdk.src.rpm Mandrake Linux 8.2/PPC: abb56b161b156cac0cba992e470d98a9 ppc/8.2/RPMS/libpython2.2-2.2-9.1mdk.ppc.rpm c8848d308e18571eb43452ad5e57907f ppc/8.2/RPMS/libpython2.2-devel-2.2-9.1mdk.ppc.rpm 5a065c10e341216cb02516166d12cdfa ppc/8.2/RPMS/python-2.2-9.1mdk.ppc.rpm 5fb31cc3f167e4f0a1e813ed535ea0a8 ppc/8.2/RPMS/python-base-2.2-9.1mdk.ppc.rpm f82636adec1620a226fce4781a771c08 ppc/8.2/RPMS/python-docs-2.2-9.1mdk.ppc.rpm fd7d4732704cc5d65d3db31aadc30679 ppc/8.2/RPMS/tkinter-2.2-9.1mdk.ppc.rpm d1ac7fa2119ec7c84d408027d44f8525 ppc/8.2/SRPMS/python-2.2-9.1mdk.src.rpm Mandrake Linux 9.0: 68816873ca418b97541ab7b817659f6d 9.0/RPMS/libpython2.2-2.2.1-14.1mdk.i586.rpm b563b5a12f11f65463e21e5035b5bff6 9.0/RPMS/libpython2.2-devel-2.2.1-14.1mdk.i586.rpm 1fd791067dd84dc2f7ed0b9d1d67348d 9.0/RPMS/python-2.2.1-14.1mdk.i586.rpm 3e011ff7fb03797803b129341ff7f087
[Full-Disclosure] Cisco IOS 12.2(4)XR
Hi, I need to evaluate Cisco IOS X-Release 12.2(4)XR (exactly S366CK9W5-12204XR,c3660-ik9w5-mz). Here is the download URL http://www.cisco.com/pcgi-bin/Software/Iosplanner/Planner-tool/iosplanner.cgi?majorRel=12.2 but the link seems broken and Cisco does not wish to support mentioned IOS anymore. I thought somebody may have kept a copy. Thanks, Behnam ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html