Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Dec 1996 19:16:17 +0100
From:      roberto@keltia.freenix.fr (Ollivier Robert)
To:        security@freebsd.org
Subject:   Re: crontab security hole exploit
Message-ID:  <Mutt.19961216191617.roberto@keltia.freenix.fr>
In-Reply-To: <l03010d00aedb15f6a17f@[208.2.87.4]>; from Richard Wackerbarth on Dec 16, 1996 09:14:25 -0600
References:  <l03010d02aedafca2ae0c@[208.2.87.4]> <l03010d00aedb15f6a17f@[208.2.87.4]>

next in thread | previous in thread | raw e-mail | index | archive | help
According to Richard Wackerbarth:
> My attitude is that it is better to have obscurity than having the exploit
> readily available to a wide audience. I realize that the truly good
> crackers can figure it out for themself. But there are many "children" who
> will try something when it is handed to them. IMHO, we should at least give

Even the children can subscribe to Bugtraq. Or 8lgm or even
linux-security...

> the upper hand to the sysops and, if possible, provide the fix before the
> attack becomes widespread.
 
Unfortunately it is generally wishful thinking more than everything
else. The only time it happens is when the bug is found during a limited
beta testing and it can be fixed before release for example...
-- 
Ollivier ROBERT    -=- The daemon is FREE! -=-    roberto@keltia.freenix.fr
  FreeBSD keltia.freenix.fr 3.0-CURRENT #31: Tue Dec  3 23:52:58 CET 1996



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Mutt.19961216191617.roberto>