[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Full-Disclosure] no more public exploits



Sadly, for the most part, no.  But, don't just blame the sysadmins.  Also
blame the business owners who demand to see a person being electricuted
before they believe a wire is unsafe.  And blame the vendors for bundling
stealth updates along with their security fixes.  Stealth updates that
"accidentally" break competitors products.  There is plenty of blame to go
around.

-----Original Message-----
From: full-disclosure-admin@xxxxxxxxxxxxxxxx
[mailto:full-disclosure-admin@xxxxxxxxxxxxxxxx]On Behalf Of Duquette,
John
Sent: Tuesday, April 27, 2004 1:52 PM
To: Yabby; full-disclosure@xxxxxxxxxxxxxxxx
Subject: RE: [Full-Disclosure] no more public exploits


That is a terrible policy to follow.  If the vulnerability is real enough
for the vendor to publish a patch, then sysadmins should patch their
systems.  Haven't all the recent worms taught people anything?



*****************************************************************************
The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee. Access to this email by anyone else
is unauthorized. 

If you are not the intended recipient, any disclosure, copying, distribution
or any action taken or omitted to be taken in reliance on it, is prohibited
and may be unlawful. When addressed to our clients any opinions or advice
contained in this email are subject to the terms and conditions expressed in
the governing KPMG client engagement letter.         
*****************************************************************************

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html