Hi Binand,
I see my job as providing the list(s) with information about the
exploit, a heads-up, how to prevent it, and other such information. I
don't want to provide the exploit -- if you want it, go find it for
yourself :-)
Yeah, yeah, it's not in the spirit of full disclosure, but I don't
want to be the one (indirectly) responsible for all of VSNL's servers
being brought to their knees, e.g.
Regards,
-- Raju
>>>>> "Binand" == Binand Raj S <[EMAIL PROTECTED]> writes:
Binand> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Binand> Raju Mathur forced the electrons to say:
>> The latest info from the front is that the exploit I posted
>> about earlier can be prevented in one of two ways:
Binand> Hi,
Binand> A URL to a description of the exploit? debian.org,
Binand> redhat.com, slashdot.org and rootshell.com have nothing. A
Binand> search on google.com also proved fruitless. And
Binand> securityfocus.com is lynx unfriendly.
Binand> Thanks in Advance,
Binand> Binand
----------------------------------------------
Find out more about this and other Linux India
mailing lists at http://lists.linux-india.org/