Date: Mon, 16 Dec 1996 19:16:17 +0100 From: roberto@keltia.freenix.fr (Ollivier Robert) To: security@freebsd.org Subject: Re: crontab security hole exploit Message-ID: <Mutt.19961216191617.roberto@keltia.freenix.fr> In-Reply-To: <l03010d00aedb15f6a17f@[208.2.87.4]>; from Richard Wackerbarth on Dec 16, 1996 09:14:25 -0600 References: <l03010d02aedafca2ae0c@[208.2.87.4]> <l03010d00aedb15f6a17f@[208.2.87.4]>
next in thread | previous in thread | raw e-mail | index | archive | help
According to Richard Wackerbarth: > My attitude is that it is better to have obscurity than having the exploit > readily available to a wide audience. I realize that the truly good > crackers can figure it out for themself. But there are many "children" who > will try something when it is handed to them. IMHO, we should at least give Even the children can subscribe to Bugtraq. Or 8lgm or even linux-security... > the upper hand to the sysops and, if possible, provide the fix before the > attack becomes widespread. Unfortunately it is generally wishful thinking more than everything else. The only time it happens is when the bug is found during a limited beta testing and it can be fixed before release for example... -- Ollivier ROBERT -=- The daemon is FREE! -=- roberto@keltia.freenix.fr FreeBSD keltia.freenix.fr 3.0-CURRENT #31: Tue Dec 3 23:52:58 CET 1996
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Mutt.19961216191617.roberto>