The kind of thing being talked about should be perhaps viewed in terms of
other work Dan has done. An exploit that alters DNS and is combined with
turning corporate browsers into gateways is perfectly feasible and would
in effect make most corporate gateways into pieces of wire. All the pieces
are
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Remote DoS in reSIProcate [MU-200807-01]
July 10, 2008
http://labs.mudynamics.com/advisories.html
Affected Products/Versions:
* repro SIP proxy/registrar 1.3.2
http://www.resiprocate.org/ReSIProcate_1.3.2_Release
* Any product using the reSIProcat
n3td3v, I've been reading your posts for many years.
Most to all of them are pointless shit.
However, I regret, this one seems to be the very first I fully agree with.
All the best
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of n3td3v
Sent: Saturday, J
On Fri, Jul 11, 2008 at 5:58 PM, n3td3v <[EMAIL PROTECTED]> wrote:
> I'm downplaying this vulnerability on purpose because I know its
> overhyped
You've generated so much traffic on this list about it that you've
actually hyped the issue up FOR them. Make sure you're collecting a
commission, I'd
n3td3v, I've been reading your posts for many years.
Most to all of them are pointless shit.
However, I regret, this one seems to be the very first I fully
agree with.
All the best
-Original Message-
From: [EMAIL PROTECTED] [mailto:full-
[EMAIL PROTECTED] On Behalf Of n3td3v
Sent: Satu