That's because no one particularly cares that it is malware. Botnets, rootkits, rats, ect are all just as potentially vulnerable as any other software, except the impact is pretty low. Let's say someone was exploiting this in the wild. Realistically what are they accomplishing? Most of the time they'd just be jacking boxes from other people that already got in. Hardly a feat when chances are you could get in through the same methods the original guy did. On Oct 11, 2012 7:08 AM, <[email protected]> wrote:
> On Wed, 10 Oct 2012 23:25:50 +0200, Pascal Ernster said: > > > I suppose it turns into a 0 day when you post it on this mailing list > > and happen to be in the mood to put the vendor's marketing division on > > BCC. > > > > -1 day could be when you ask a friend to check your mail to this ML for > > major grammar errors before you post it. > > All this ranting about the meaning of a 0-day - and not one person has > mentioned the fact that the vulnerability is in *malware*??!? > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
