I sense from the earlier comments that there may be hesitation to
document the flaw for fear that such documentation would facilitate
exploitation before remediation is in place.

It that is a possiblity, public documentation should wait until some form
of private peer review can occur. I'm not speaking beyond my experience,
by my impression is that CERT provides a mechanism for recording these
sorts of issues allowing for review, etc.

My second suggestion, if the flaw is known to be implemented in released 
software, contact the security departments of the distributors of such
software.
_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

Reply via email to