-----BEGIN PGP SIGNED MESSAGE----- Hi, Derek.
So right now this is a scary rumor floating around the security scene?
Right. Rumors for now...
Is there any particular trace, or any further details your aware of?
Not at this time.
Also, I think it Amay be safe to assume the Mac OS X/Jaguar may be vulnerable as well. AFAIK it runs of the BSD IP Stack, so it's more than likely that it is vulnerable if this exploit is in fact a reality. I'll keep an eye out for any suspicious traffic myself, as I'm sure will the rest of the list.
Thank you, we really appreciate it.
Thanks for the warning, as if this is real, it could be be potentially very harmful. Any great C Coders out there start pouring over the code yet?
Glad to be of help. I really appreciate the feedback we get from the NANOG community. Thanks again, Ian Ian A. Finlay CERT (R) Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA USA 15213-3890 -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBPX4I9aCVPMXQI2HJAQFabAQAnwkyxn2LZJ0VOv3L7RT5jwzGEy0pRL7A FRE920tu4ys8fuaoweFp1YaiUUlVPFuoPFgFWlsHJ7uUkUVcL0T6Kzm5bzp8C5hz QYdYjuumEj1thy/zxzzAJIsJqiLcXG0rW0iAlpaQ0X30JqH13OEHVr4Wuev0a2Pi efDOLkEzliQ= =dZDX -----END PGP SIGNATURE-----