lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed Nov 23 13:52:38 2005
From: anonymous.squirrel at gmail.com (Anonymous Squirrel)
Subject: SANS Top 20: Mac OS X?

I see SANS has put the Mac OS X in it's "Top 20" list of vulnerabilities.
Not parts of the OS, and not misconfigurations, but ALL of the Mac OS X.  Is
that OS really a "vulnerability" of such magnitude that it deserves a "Top
20" listing?

I'm puzzled, SANS remediation is merely patch, turn on the firewall, and
configure per published guidelines.  That fits for _any_ OS.

It just doesn't make sense that the _entire_ OS is a "Top 20" yet the
remediation is so basic.

Does SANS know something we don't?  Is the mere existence of OS X in a
network so bad that it deserves to be tagged as a "Top 20"?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051123/4f6ad8ef/attachment.html

Powered by blists - more mailing lists