TIP: Click on subject to list as thread! ANSI
echo: linuxhelp
to: Rich
from: Joe Barr
date: 2003-03-03 19:25:54
subject: Re: sendmail exploit

From: "Joe Barr" 

On Mon, 03 Mar 2003 17:14:36 +0000,  wrote:

>    LOL!  You both are amazing.
>
>    This is a great example of how having source available provides
>    absolutely no assurance that someone will have found the serious
>    security problems.  It's not like this is the first demonstration of
>    this nor will it be the last.
>
>    It is also a great example of how bugs are not fixed as quickly as
>    some people claim.  Maybe Mike is using the same measure of time he
>    used to claim that Opera 7.0 security flaws that took 2-1/2 months to
>    fix only took 2 days.  This one took 7 weeks (see
>    http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950).
>
> Rich

Hey, Shupak

Have you stupid bitches gotten your "glitches" at bCentral patched up yet?

You asswipes can't even run a website but you want to talk about
"trustworthy computing."

But it's been a pretty good week for MS so far.  I haven't seen any word of
critical security fixes since last Thursday.  But that is the regular day
for pouring them out, isn't it.





--

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.