TIP: Click on subject to list as thread! ANSI
echo: linuxhelp
to: Peter Sawatzki
from: Rich
date: 2003-03-04 21:05:34
subject: Re: sendmail exploit

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0092_01C2E291.CCFF64A0
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   See http://news.com.com/2100-1002-991041.html.

Rich

  "Peter Sawatzki"  wrote in message =
news:MPG.18cf3b7d6830bc199896e6{at}news.barkto.com...
  In article , warthawg{at}austin.rr.com says...
  > On Mon, 03 Mar 2003 21:16:42 +0000, Geo. wrote:
  >=20
  > > "Joe Barr"  wrote in message
  > > news:3e63eac3{at}w3.nls.net...
  > >=20
  > >=20
  > >> Amazing, isn't it?  That vulnerability has been in the code for =
15 years
  > >> and as far as anyone knows, it has never been exploited.  And now =
it's
  > >> fixed.  The open source business really works.
  > >=20
  > > How do you know it's never been exploited? Hundreds of people have =
known
  > > about it since January 13th. They just didn't announce it publicly =
until
  > > today.
  > >=20
  > > Geo.
  >=20
  > Name one report of an exploit being found.
  >=20
  >=20

  Still remains the question: How do you know it's never been exploited =
?=20
  You failed to answer this question.

  Peter
------=_NextPart_000_0092_01C2E291.CCFF64A0
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   See http://news.com.com/21" target="new">http://news.com.com/21=">http://news.com.com/2100-1002-991041.html">http://news.com.com/21=
00-1002-991041.html.
 
Rich
 

  "Peter Sawatzki" <Peter{at}Sawatzki.de>">mailto:Peter{at}Sawatzki.de">Peter{at}Sawatzki.de>
wrote in =
message news:MPG.18cf3b7=
d6830bc199896e6{at}news.barkto.com...In=20
  article <3e643599$1{at}w3.nls.net>,">mailto:3e643599$1{at}w3.nls.net">3e643599$1{at}w3.nls.net>,
=
warthawg{at}austin.rr.com=20">mailto:warthawg{at}austin.rr.com">warthawg{at}austin.rr.com=20
  says...> On Mon, 03 Mar 2003 21:16:42 +0000, Geo. =
wrote:>=20
  > > "Joe Barr" <warthawg{at}austin.rr.com>">mailto:warthawg{at}austin.rr.com">warthawg{at}austin.rr.com>
=
wrote in=20
  message> > news:3e63eac3{at}w3.nls.net...>=
 >=20
  > > > >> Amazing,
isn't it?  That =
vulnerability=20
  has been in the code for 15 years> >> and
as far as =
anyone knows,=20
  it has never been exploited.  And now it's>
>> =
fixed. =20
  The open source business really works.> >
> > How =
do you=20
  know it's never been exploited? Hundreds of people have known> =
>=20
  about it since January 13th. They just didn't announce it publicly=20
  until> > today.> >
> > Geo.> =
>=20
  Name one report of an exploit being found.> > =
Still=20
  remains the question: How do you know it's never been exploited ? =
You=20
  failed to answer this =
question.Peter

------=_NextPart_000_0092_01C2E291.CCFF64A0--

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.