-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:144
http://www.mandriva.com/security/
n3td3v, I've been reading your posts for many years.
Most to all of them are pointless shit.
However, I regret, this one seems to be the very first I fully
agree with.
All the best
-Original Message-
From: [EMAIL PROTECTED] [mailto:full-
[EMAIL PROTECTED] On Behalf Of n3td3v
Sent:
On Fri, Jul 11, 2008 at 5:58 PM, n3td3v [EMAIL PROTECTED] wrote:
I'm downplaying this vulnerability on purpose because I know its
overhyped
snip
You've generated so much traffic on this list about it that you've
actually hyped the issue up FOR them. Make sure you're collecting a
commission,
n3td3v, I've been reading your posts for many years.
Most to all of them are pointless shit.
However, I regret, this one seems to be the very first I fully agree with.
All the best
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of n3td3v
Sent: Saturday,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Remote DoS in reSIProcate [MU-200807-01]
July 10, 2008
http://labs.mudynamics.com/advisories.html
Affected Products/Versions:
* repro SIP proxy/registrar 1.3.2
http://www.resiprocate.org/ReSIProcate_1.3.2_Release
* Any product using the
The kind of thing being talked about should be perhaps viewed in terms of
other work Dan has done. An exploit that alters DNS and is combined with
turning corporate browsers into gateways is perfectly feasible and would
in effect make most corporate gateways into pieces of wire. All the pieces
are