[<prev] [next>] [day] [month] [year] [list]
Message-ID: <517427E78F20CF4DB817BEB8504B002B013E69A9@mail.atlasvanlines.ca>
Date: Fri Mar 24 19:20:34 2006
From: aflorjancic at atlasvanlines.ca (Andrew Florjancic)
Subject: RE: SendGate: Sendmail Multiple Vulnerabilities
(Race Condition DoS, Memory Jumps, Integer Overflow)
Finally PEOPLE speak the TRUTH!!!! Well said!!
-----Original Message-----
From: Theo de Raadt [mailto:deraadt@....openbsd.org]
Sent: Thursday, March 23, 2006 9:52 PM
To: Gadi Evron
Cc: bugtraq@...urityfocus.com; full-disclosure@...ts.grok.org.uk
Subject: Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition
DoS, Memory Jumps, Integer Overflow)
> Sendmail is, as we know, the most used daemon for SMTP in the world.
> This is an International Infrastructure vulnerability and should have
> been treated that way. It wasn't. It was handled not only poorly, but
> irresponsibly.
You would probably expect me to the be last person to say that Sendmail
is perfectly within their rights. I have had a lot of problems with
what they are doing.
But what did you pay for Sendmail? Was it a dollar, or was it more?
Let me guess. It was much less than a dollar. I bet you paid nothing.
So does anyone owe you anything, let alone a particular process which
you demand with such length?
Now, the same holds true with OpenSSH. I'll tell you what. If there is
ever a security problem (again :) in OpenSSH we will disclose it exactly
like we want, and in no other way, and quite frankly since noone has
ever paid a cent for it's development they have nothing they can say
about it.
Dear non-paying user -- please remember your place.
Or run something else.
OK?
Luckily within a few months you will be able to tell Sendmail how to
disclose their bugs because their next version is going to come out with
a much more commercial licence. Then you can pay for it, and then you
can complain too.
Powered by blists - more mailing lists