lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABgXHn9Sb7VELpZcXL5tQj2D+CZ22bNJBsoeifC9UtG5JHPaQg@mail.gmail.com>
Date: Sun, 20 Nov 2011 09:12:28 +0000
From: Dan Ballance <tzewang.dorje@...il.com>
To: secn3t@...il.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Ubuntu 11.10 now unsecure by default

Why not disclose the weakest of the 10, silence the doubters and keep the
other 9 to yourself? There seem to be a lot of people on this list who
doubt your skills. Why not give them something small and repair your
reputation?
On 20 Nov 2011 00:32, "xD 0x41" <secn3t@...il.com> wrote:

> I have said what I wanted to say... i wikll not disclose exploits on
> fd... sorry....
> Just think of the MS issue, compared to Ubuntu user issue.. forget the
> rest :-)
>
>
>
> On 20 November 2011 11:23, root <root_@...ertel.com.ar> wrote:
> > what you say, main binary of ubuntu is suid?
> >
> > That enough, I'm switching to freebsd now. Also, this email is sarcasm
> haha
> >
> >
> >
> > On 11/19/2011 06:23 PM, GloW - XD wrote:
> >> Recently some stupid people got into management (as always happens)
> >>
> >> Oh here your right, but you still can relent, just dont fucking use
> >> the os wich sucks, i have learnt that this suually dictates how an os
> >> gets put tyogether... or no.... tajke some lessons out of windows
> >> even,. but do it smarter... idc, id never put ubuntu on a prod, OR
> >> local box, It got me once with the APC mags promo about how cooool ubu
> >> is, then i found there is only about 100 bad binarys, your almost
> >> there now, only 30 or so togo! almost patched dude! tyhe biggest laugh
> >> is, your main binary wich is simplest, is vulnerable to suid attack...
> >> i guess some people would know this method, and know what i am talking
> >> about.. if not badluck.
> >>
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ