Re: [Full-disclosure] Three years and ten months without a patch

2005-11-16 Thread Marco Ermini
On 11/16/05, Barrie Dempster <[EMAIL PROTECTED]> wrote: [...] > Are we forgetting slammer ? A worm that attacked a product which you > would expect to be used in a similar way. > > Backend or not, the system should be patched, being backend is not a > justifiable reason for not patching the system.

Re: [Full-disclosure] Three years and ten months without a patch

2005-11-16 Thread Barrie Dempster
On Wed, 2005-11-16 at 10:19 +0100, Marco Ermini wrote: > On 11/15/05, InfoSecBOFH <[EMAIL PROTECTED]> wrote: > > So why not start teaching some lessons David and release exploit code. > > It seems that is the only way they learn and take thing seriously. > > Rarely this software did not run in a

Re: [Full-disclosure] Three years and ten months without a patch

2005-11-16 Thread Marco Ermini
On 11/15/05, InfoSecBOFH <[EMAIL PROTECTED]> wrote: > So why not start teaching some lessons David and release exploit code. > It seems that is the only way they learn and take thing seriously. Rarely this software did not run in a what is considered "secured" environment - I mean, this is rarely

Re: [Full-disclosure] Three years and ten months without a patch

2005-11-15 Thread InfoSecBOFH
So why not start teaching some lessons David and release exploit code. It seems that is the only way they learn and take thing seriously. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sp

[Full-disclosure] Three years and ten months without a patch

2005-11-15 Thread David Litchfield
Whilst looking over old Oracle bugs I discovered that a _fully_ _patched_ 8.1.7.4 Oracle server is still vulnerable to the old extproc flaw [http://www.ngssoftware.com/advisories/oraplsextproc.txt]; this flaw, when exploited, allows a remote attacker without a userID and password to take control of