SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : COMS & the Ghost of USRX w/ other STUFF -- Ignore unavailable to you. Want to Upgrade?


To: Scrapps who wrote (15455)5/18/1998 9:46:00 AM
From: Moonray  Respond to of 22053
 
3Com Fixes Security Glitch Caused By Internet Chatter's Gaff
Newsbytes - May 15, 1998 13:47

BOXBORO, MASSACHUSETTS, U.S.A., 1998 MAY 15 (NB) -- Newsbytes.
To quickly remedy a security risk to some of 3Com Corp's [NASDAQ:COMS]
local area network (LAN) switches, apparently produced accidentally by
an Internet user in a chat session last night, 3Com has issued
instructions on its World Wide Web site about how to close the hole
in password procedures, Newsbytes has learned.

The security breach happened when an "unauthorized" person posted
default procedures for entering some models of 3Com's CoreBuilder and
SuperStack II switches through the "back door," during a session on
Internet chat site dedicated to development and networking issues,
according to a 3Com spokesperson.

Evidently, this individual was only trying to give help to another
user on the chat site, and was without any malicious intent, the
spokesperson told Newsbytes.

Ordinarily, 3Com only makes these procedures known when an administrator
reports a problem requiring back door access, such as loss of password,
or a need to do "special debugging," he added.

As soon as 3Com found out about the security impediment, a workaround
was posted on the company Web site, Newsbytes was told.

The solution provides instructions on how to change passwords and SNMP
(Simple Network Management Protocol) Community identifiers to prevent
unauthorized access to the switches. It is accessible on the Web at
3com.com .

3Com is also "getting the word out" about the workaround through its
field sales force, channel partners, and other industry influencers,
the 3Com spokesperson said.

The only switches affected by the breach are the CoreBuilder
2500/6000/3500 and the SuperStack II Switch 2200/3900/9300.

3Com also plans to release fixed versions of software for these
switches by next Wednesday, May 20, according to the spokesperson.

Users can obtain more information by calling 3Com's Customer Service
Organization at 1-888-225-1733, or by contacting their local 3Com
customer service facilities.

3Com is located at 3com.com on the Web.

o~~~ O