lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <453BCB42.8020605@digitalmunition.com> Date: Sun, 22 Oct 2006 15:49:22 -0400 From: "K F (lists)" <kf_lists@...italmunition.com> To: full-disclosure@...ts.grok.org.uk Subject: Re: HP Tru64 dtmail bug - Really exploitable? Roman Medina-Heigl Hernandez wrote: > > More or less according to HP advisory ("HPSBTU02163 SSRT061223") which > marks the impact as POTENTIAL ("Potential Security Impact: Local execution > of arbitrary code") Don't mind the smoke and mirrors. HP always says that. Even with working root exploits in hand HP will release an advisory that say 'potential'. don't believe me? http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html http://downloads.securityfocus.com/vulnerabilities/exploits/TRU64_su.pl funny how that works eh? -KF _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/