TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Randall Parker
from: Geo
date: 2005-08-09 19:46:06
subject: Re: ZoneAlarm upgrade 6.0.631.003 - arghh!!!

From: "Geo" 

If it's a known issue, it takes all of 4 minutes to google up the exploit
code and tons of information about it.

Geo.

"Randall Parker"

wrote in message news:42f82de4$1{at}w3.nls.net...
> Well, security thru obscurity really is an advantage against a large array
of attacks.
>
> Suppose OS/2 has some buffer overflow in its TCP/IP stack. The odds of an
attacker
> noticing that you have OS/2 in your firewall and then also having a tool
to exploit
> this seem remote.
>
> Mike N. wrote:
> >    Well, although I wouldn't have a problem with my financial
institutions
> > using OS/2 Warp for niche use where it is well isolated and protected, I
> > would be very uncomfortable if they relied on "OS/2's hardened
features".
> > This is certainly a myth and the TCP stack undoubtably contains some
> > ancient vulnerabilities since it was BSD derived.  Just because it isn't
a
> > popular target doesn't mean it isn't vulnerable.     I'll bet at least
one
> > Russian hacker still possesses a 0-day attack against OS/2.
> >

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.