[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability
- To: "zdi-disclosures@xxxxxxxx" <zdi-disclosures@xxxxxxxx>
- Subject: Re: [Full-disclosure] ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability
- From: "Dude VanWinkle" <dudevanwinkle@xxxxxxxxx>
- Date: Thu, 30 Nov 2006 20:52:25 -0500
On 11/30/06, zdi-disclosures@xxxxxxxx <zdi-disclosures@xxxxxxxx> wrote:
Thanks for pointing this out JP, it does in fact look confusing. We
determined during the Digital Vaccine filter creation process that a
previously released filter was robust enough to block the attack without
further modification and the vendor was immeditately notified.
NP,
I would clarify that in future notifications. i.e.: "tippingpoint
customers have been
protected from attacks of this kind since xyz date by GenericFilterX". Then
you could list the time lines for discovered/acquired, vendor
notification, patch released from vendor, and finally; public
disclosure.
-JP