Vulnerability Development mailing list archives
Re: Exploit Ease Level
From: gaugustu () CISCO COM (Eric Augustus)
Date: Fri, 5 May 2000 07:48:03 -0500
C'mon, really what you're after is "do I have to fix this vulnerability now because it's really easy to exploit, or can it wait since it's too difficult to duplicate". The fact that a vulnerability in XYZ has been demonstrated, and your system is running XYZ should be enough to incentive to fix it. Unless, of course, you're willing to live with the risk. On Fri, Apr 28, 2000 at 05:50:54PM -0400, Rory Savage wrote:
True, very true, but imagein something like this in the header of an exploit.... Red Hat 6.2 Sendmail Dos Exploit Level 10+ (You will loose sleep and possible your marraige) Exploited with the help of a BeoWolf cluster (see attachment for details) Time: 2 weeks, 2 days, 22 hours, 22 minutes, and 22 seconds. Etc Etc In Red Hat 6.2, there lies a problem with sendmail's (whatever..) ... ... ... Joe Cracker and Assoc.
[snip] -- ---------------------------------------------------------- Eric P. Augustus | gaugustu () cisco com Network Security Engineer | www.cisco.com Cisco Systems Inc. | Voice: 512.378.1051 12515 Research Blvd. | Fax: 512.249.8506 Austin, Texas 78759-2220 | Pager: 800.365.4578 ---------------------------------------------------------- Remember the... the... uhh.....
Current thread:
- Re: Exploit Ease Level Joel A. Foner (May 01)
- <Possible follow-ups>
- Re: Exploit Ease Level Eric Augustus (May 05)