| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: sendmail exploit |
From: Peter Sawatzki
In article , warthawg{at}austin.rr.com says...
> On Mon, 03 Mar 2003 21:16:42 +0000, Geo. wrote:
>
> > "Joe Barr" wrote in message
> > news:3e63eac3{at}w3.nls.net...
> >
> >
> >> Amazing, isn't it? That vulnerability has been in the code
for 15 years
> >> and as far as anyone knows, it has never been exploited. And now it's
> >> fixed. The open source business really works.
> >
> > How do you know it's never been exploited? Hundreds of people have known
> > about it since January 13th. They just didn't announce it publicly until
> > today.
> >
> > Geo.
>
> Name one report of an exploit being found.
>
>
Still remains the question: How do you know it's never been exploited ? You
failed to answer this question.
Peter
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.