Hi Binand,

I see my job as providing the list(s) with information about the
exploit, a heads-up, how to prevent it, and other such information.  I
don't want to provide the exploit -- if you want it, go find it for
yourself :-)

Yeah, yeah, it's not in the spirit of full disclosure, but I don't
want to be the one (indirectly) responsible for all of VSNL's servers
being brought to their knees, e.g.

Regards,

-- Raju

>>>>> "Binand" == Binand Raj S <[EMAIL PROTECTED]> writes:

    Binand> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

    Binand> Raju Mathur forced the electrons to say:
    >> The latest info from the front is that the exploit I posted
    >> about earlier can be prevented in one of two ways:

    Binand> Hi,

    Binand> A URL to a description of the exploit? debian.org,
    Binand> redhat.com, slashdot.org and rootshell.com have nothing. A
    Binand> search on google.com also proved fruitless.  And
    Binand> securityfocus.com is lynx unfriendly.

    Binand> Thanks in Advance,

    Binand> Binand

----------------------------------------------
Find out more about this and other Linux India 
mailing lists at http://lists.linux-india.org/

Reply via email to