From owner-freebsd-security Wed Feb 5 17:29:29 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id RAA02912 for security-outgoing; Wed, 5 Feb 1997 17:29:29 -0800 (PST) Received: from dns.pinpt.com (dns.pinpt.com [205.179.195.1]) by freefall.freebsd.org (8.8.5/8.8.5) with SMTP id RAA02902 for ; Wed, 5 Feb 1997 17:29:23 -0800 (PST) Received: from journeyman (gatemaster.pinpt.com [205.179.195.65]) by dns.pinpt.com (8.6.12/8.6.12) with SMTP id RAA07495; Wed, 5 Feb 1997 17:28:14 -0800 Date: Wed, 5 Feb 97 17:24:40 Pacific Standard Time From: "Sean J. Schluntz" Subject: Re: 2.1.6+++: crt0.c CRITICAL CHANGE To: Karl Denninger Cc: freebsd-security@freebsd.org, karl@Mcs.Net X-Mailer: Chameleon ATX 6.0, Standards Based IntraNet Solutions, NetManage Inc. X-Priority: 3 (Normal) References: <199702060116.TAA21953@Jupiter.Mcs.Net> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > > > I AM PART OF THE SOLUTION. > > > > > And yes, I WILL submit a pr on this as soon as I can find a few hours to > > > do the fix, verify it, and make world to test. At the same time I post > > > it to the committers I'll post it publically, and 24 hours later I post > > > the exploit which takes advantage of the problem. > > > > This is being part of the solution? Telling the world how to hack the systems > > of people who don't watch the lists or don't have enough time to patch a > > network of systems? > > > > 24 hours is not enough time for people to get the patch implemented. You > > would be personally sentencing people and their business to death by doing > > this. > > > > Would you like it if you were sick for two days and came back to find your > > network toast because someone pulled a stunt like that? > > > Uh, excuse me, but the EXPLOIT has been in ACTIVE use for *TWO MONTHS* now. > > Its *NOT* new. It is being *ACTIVELY* used by the hacker contingent. > Therefore, hiding *ANYTHING* at this point serves no purpose. > > How can I possibly "hurt" things at this point... If the exploit is already public then what difference to the FBSD community make by you posting it? By giving a large pointer saying, look here, come after us!! Again, this will be of no help to those who do not monitor the lists and just rely on the CD that is shipped automatically (As mine is) when it is ready. Being part of the problem is not being part of the solution. If you want to follow up, do so in private, that way we don't waist other people time. -Sean ---------------------------------------------------------------------- Sean J. Schluntz Manager, Support Services ph. 408.997.6900 x222 PinPoint Software Corporation fx. 408.323.2300 6155 Almaden Expressway, Suite 100 San Jose, CA. 95120 http://www.pinpt.com/ Local Time Sent: 02/05/97 17:24:40 ----------------------------------------------------------------------