TIP: Click on subject to list as thread! ANSI
echo: linuxhelp
to: Joe Barr
from: Peter Sawatzki
date: 2003-03-04 22:39:30
subject: Re: sendmail exploit

From: Peter Sawatzki 

In article , warthawg{at}austin.rr.com says...
> On Mon, 03 Mar 2003 21:16:42 +0000, Geo. wrote:
>
> > "Joe Barr"  wrote in message
> > news:3e63eac3{at}w3.nls.net...
> >
> >
> >> Amazing, isn't it?  That vulnerability has been in the code
for 15 years
> >> and as far as anyone knows, it has never been exploited.  And now it's
> >> fixed.  The open source business really works.
> >
> > How do you know it's never been exploited? Hundreds of people have known
> > about it since January 13th. They just didn't announce it publicly until
> > today.
> >
> > Geo.
>
> Name one report of an exploit being found.
>
>

Still remains the question: How do you know it's never been exploited ? You
failed to answer this question.

Peter

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.