[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability
- To: "zdi-disclosures@xxxxxxxx" <zdi-disclosures@xxxxxxxx>
- Subject: Re: [Full-disclosure] ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability
- From: "Dude VanWinkle" <dudevanwinkle@xxxxxxxxx>
- Date: Thu, 30 Nov 2006 20:52:25 -0500
On 11/30/06, zdi-disclosures@xxxxxxxx <zdi-disclosures@xxxxxxxx> wrote:
> Thanks for pointing this out JP, it does in fact look confusing. We
> determined during the Digital Vaccine filter creation process that a
> previously released filter was robust enough to block the attack without
> further modification and the vendor was immeditately notified.
NP,
I would clarify that in future notifications. i.e.: "tippingpoint
customers have been
protected from attacks of this kind since xyz date by GenericFilterX". Then
you could list the time lines for discovered/acquired, vendor
notification, patch released from vendor, and finally; public
disclosure.
-JP
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/