[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20121010232550.06f0fa67@hardfalcon-3>
Date: Wed, 10 Oct 2012 23:25:50 +0200
From: Pascal Ernster <full-disclosure@...dfalcon.net>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Multiple 0-days in Dark Comet RAT
On Tue, 9 Oct 2012 17:59:13 +0100
Philip Whitehouse <philip@...uk.com> wrote:
> Does 0-day have any meaning any more? It used to mean there were
> exploits in the wild used to cause damage before the vendor patched
> it not merely that a security researcher found it and disclosed it to
> the public before the vendor did.
>
> If a 0 day is everything found by a security team before a vendor
> then the term will loose all purpose and meaning because almost all
> work done by such researchers is finding vulns. before the vendor.
I suppose it turns into a 0 day when you post it on this mailing list
and happen to be in the mood to put the vendor's marketing division on
BCC.
-1 day could be when you ask a friend to check your mail to this ML for
major grammar errors before you post it.
> End rant.
>
> Philip Whitehouse
>
> On 8 Oct 2012, at 21:33, "Hertz, Jesse" <jesse_hertz@...wn.edu> wrote:
>
> > SQL Injection and Arbitrary File Access present in Command and
> > Control server of DarkComet RAT
> >
> > for more info see:
> > http://matasano.com/research/PEST-CONTROL.pdf
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists