[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1474141227.20040914192422@SECURITY.NNOV.RU>
From: 3APA3A at SECURITY.NNOV.RU (3APA3A)
Subject: Correction to latest Colsaire advisories
Dear advisories,
--Tuesday, September 14, 2004, 6:24:09 PM, you wrote to full-disclosure@...ts.netsys.com:
a> Did you try Google? ;)
a> http://www.uniras.gov.uk/vuls/2004/380375/mime.htm
I saw this link in your advisory. For this case I teach my students to
use information already gathered. Only vulnerable product listed is
ripMIME. ripMIME team always replies to this kind of incidents and
provides really good solution (better than recommended one, BTW).
a> Admitedly it is a bit thin at the moment (and many names are conspicous by
a> their absense). This should improve as more vendors provide a statement.
>> Of cause, poor, busy and tired 3APA3A can not do it alone.
a> You never had to; NISCC, CERT/CC?
I did with CERT. It looks like for last 2-3 years CERT does not responds
to individual researchers. BTW: there is no more CERT/CC. Now it's
CERT-US.
>> How this information helps vendors to secure their products?
a> Any vendors (who have not already been involved so far) who wish to get more
a> detail are encouraged to contact the NISCC team and request a copy of the
a> test suite.
--
~/ZARAZA
??? ????? ?????? ??????, ??? ?????? ?????? ?? ?????. (????)
Powered by blists - more mailing lists