| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: sendmail exploit |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_0092_01C2E291.CCFF64A0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
See http://news.com.com/2100-1002-991041.html.
Rich
"Peter Sawatzki" wrote in message =
news:MPG.18cf3b7d6830bc199896e6{at}news.barkto.com...
In article , warthawg{at}austin.rr.com says...
> On Mon, 03 Mar 2003 21:16:42 +0000, Geo. wrote:
>=20
> > "Joe Barr" wrote in message
> > news:3e63eac3{at}w3.nls.net...
> >=20
> >=20
> >> Amazing, isn't it? That vulnerability has been in the code for =
15 years
> >> and as far as anyone knows, it has never been exploited. And now =
it's
> >> fixed. The open source business really works.
> >=20
> > How do you know it's never been exploited? Hundreds of people have =
known
> > about it since January 13th. They just didn't announce it publicly =
until
> > today.
> >=20
> > Geo.
>=20
> Name one report of an exploit being found.
>=20
>=20
Still remains the question: How do you know it's never been exploited =
?=20
You failed to answer this question.
Peter
------=_NextPart_000_0092_01C2E291.CCFF64A0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
See http://news.com.com/21" target="new">http://news.com.com/21=">http://news.com.com/2100-1002-991041.html">http://news.com.com/21=
00-1002-991041.html.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.