RE: [SLUG] Insight on Code Red II

From: Miller, Matt (Matt.Miller@expanets.com)
Date: Thu Aug 09 2001 - 14:24:23 EDT


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>FUD, pure and unadulterated ...
>
>Not one of the cited packages has a public active current
>exploit against the current code -- That people who run
>unpatched services implies a People problem, not a Linux
>problem.

Current code, sure...but for how long? New exploits have and are
bound to be discovered -- history proves this -- especially with the
increasing number of script kiddies out there constantly probing and
testing for new vunerabilities.
Here is list of CERT advisories over the last 10 years -
http://www.cert.org/advisories/ .

Matt

- -----Original Message-----
From: R P Herrold [mailto:herrold@owlriver.com]
Sent: Thursday, August 09, 2001 2:08 PM
To: 'slug@nks.net'
Subject: RE: [SLUG] Insight on Code Red II

On Thu, 9 Aug 2001, Miller, Matt wrote:

> > And those "extreme" weaknesses would be what?
>
> How about various remote root exploits in apache, bind, procmail,
> sendmail,

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBO3LVvxdNCRTdob+hEQL8aACg0C7c8J/omG4L12/TpARdS5D9yNUAn1Xl
dKcIfJ8WMeTO0JNaMWqcNnMv
=tvWB
-----END PGP SIGNATURE-----



This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 18:57:43 EDT