-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
>FUD, pure and unadulterated ...
>
>Not one of the cited packages has a public active current
>exploit against the current code -- That people who run
>unpatched services implies a People problem, not a Linux
>problem.
Current code, sure...but for how long? New exploits have and are
bound to be discovered -- history proves this -- especially with the
increasing number of script kiddies out there constantly probing and
testing for new vunerabilities.
Here is list of CERT advisories over the last 10 years -
http://www.cert.org/advisories/ .
Matt
- -----Original Message-----
From: R P Herrold [mailto:herrold@owlriver.com]
Sent: Thursday, August 09, 2001 2:08 PM
To: 'slug@nks.net'
Subject: RE: [SLUG] Insight on Code Red II
On Thu, 9 Aug 2001, Miller, Matt wrote:
> > And those "extreme" weaknesses would be what?
>
> How about various remote root exploits in apache, bind, procmail,
> sendmail,
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>
iQA/AwUBO3LVvxdNCRTdob+hEQL8aACg0C7c8J/omG4L12/TpARdS5D9yNUAn1Xl
dKcIfJ8WMeTO0JNaMWqcNnMv
=tvWB
-----END PGP SIGNATURE-----
This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 18:57:43 EDT