Full Disclosure mailing list archives
Re: ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability
From: "Dude VanWinkle" <dudevanwinkle () gmail com>
Date: Thu, 30 Nov 2006 20:52:25 -0500
On 11/30/06, zdi-disclosures () 3com com <zdi-disclosures () 3com com> wrote:
Thanks for pointing this out JP, it does in fact look confusing. We determined during the Digital Vaccine filter creation process that a previously released filter was robust enough to block the attack without further modification and the vendor was immeditately notified.
NP, I would clarify that in future notifications. i.e.: "tippingpoint customers have been protected from attacks of this kind since xyz date by GenericFilterX". Then you could list the time lines for discovered/acquired, vendor notification, patch released from vendor, and finally; public disclosure. -JP _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability zdi-disclosures (Nov 29)
- Re: ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability Dude VanWinkle (Nov 30)
- Re: ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability zdi-disclosures (Nov 30)
- Re: ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability Dude VanWinkle (Nov 30)
- Re: ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability zdi-disclosures (Nov 30)
- Re: ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability Dude VanWinkle (Nov 30)