Full Disclosure mailing list archives
Re: SSH Exploit Request
From: Valdis.Kletnieks () vt edu
Date: Sun, 16 Nov 2003 12:24:16 -0500
On Sun, 16 Nov 2003 08:30:03 EST, Vladimir Parkhaev said:
Of course not, but I personally prefer to take a chance (and responsibility) for impacting a prod server with gone-wild-ssh-update over being 0wned.
`As do I. Maybe I've just been reading comp.risks for too many years, but what I objected to was the "it's *perfectly* safe..." attitude that some were projecting. The older readers on this list probably remember a movie trailer with the line "and nothing can possibly go wrong.. go wrong.. go wrong.. go wrong...."
Attachment:
_bin
Description:
Current thread:
- Re: SSH Exploit Request, (continued)
- Re: SSH Exploit Request Valdis . Kletnieks (Nov 14)
- IE Vulnerability Sites Edward W. Ray (Nov 14)
- Re: SSH Exploit Request Peter Moody (Nov 14)
- Re: SSH Exploit Request Chris Watson (Nov 14)
- Re: SSH Exploit Request Gregory A. Gilliss (Nov 14)
- Re: SSH Exploit Request Bryan Allen (Nov 15)
- Re: SSH Exploit Request Valdis . Kletnieks (Nov 15)
- Re: SSH Exploit Request Vladimir Parkhaev (Nov 15)
- Re: SSH Exploit Request Valdis . Kletnieks (Nov 15)
- Re: SSH Exploit Request Vladimir Parkhaev (Nov 16)
- Re: SSH Exploit Request Valdis . Kletnieks (Nov 16)
- Re: SSH Exploit Request Jonathan A. Zdziarski (Nov 16)
- spoofing sir kaber (Nov 16)
- Re: SSH Exploit Request Ron DuFresne (Nov 16)
- Re: SSH Exploit Request KF (Nov 14)
- Re: SSH Exploit Request Jeremiah Cornelius (Nov 13)
- Re: SSH Exploit Request Adam (Nov 13)
- Re: SSH Exploit Request Ron DuFresne (Nov 13)
- Re: SSH Exploit Request Florian Weimer (Nov 13)
- Re: SSH Exploit Request Damian Gerow (Nov 13)