-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm not sure if "overnight" is correct - since we released it around 4pm EST into our Partner's program. This is something different from CANVAS Professional in that it's more a program for large penetration testing companies, government agencies, and security providers. But it's still funny that you can write an exploit faster than someone can go through Microsoft Update....sometimes I don't know why people bother patching at all.
- -dave Matt Davis wrote: > Just came across this on news.com regarding MS06-040 and homeland > security's response: > > http://news.com.com/2100-7348_3-6103805.html?part=rss&tag=6103805&subj=news > > > > > "Overnight, popular hacker toolkits were updated with code that > allows researchers to check for the flaw and exploit it, said Neel > Mehta, a security expert at Internet Security Systems in Atlanta." > > Did I completely miss exploit code being released in the wild for > that vulnerability? > > TIA > > _______________________________________________ Full-Disclosure - > We believe in it. Charter: > http://lists.grok.org.uk/full-disclosure-charter.html Hosted and > sponsored by Secunia - http://secunia.com/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iD8DBQFE2iszB8JNm+PA+iURAvEWAJ0RU+sURftT8RI6DMNz7VWUBvDOYQCeLN/+ Y6ag2D5CHVSFJpZFyLtoJwU= =YV/P -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
