Vendors of most major operating systems and network hardware participated in the effort. Each vendor also released their own advisories and patches using their existing patch processes. The US CERT also played a major role in coordinating the release and advises all organizations to test the patches from the vendors and get them applied as soon as possible. While no known malicious activity exists as of the time of this writing, it is largely known that attackers are assembling the details that have been made public and are attempting to recreate the vulnerability and exploitation techniques that the initial researcher discovered.
Download the paper in PDF format here.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.