[102413] in North American Network Operators' Group
Re: IBM report reviews Internet crime
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Feb 12 15:29:59 2008
To: Owen DeLong <owen@delong.com>
Cc: michael.dillon@bt.com, nanog@nanog.org
In-Reply-To: Your message of "Tue, 12 Feb 2008 11:17:55 PST."
<7C2098E2-1A14-451D-8CC5-6C58D3C214F6@delong.com>
From: Valdis.Kletnieks@vt.edu
Date: Tue, 12 Feb 2008 15:27:58 -0500
Errors-To: owner-nanog@merit.edu
--==_Exmh_1202848078_2949P
Content-Type: text/plain; charset=us-ascii
On Tue, 12 Feb 2008 11:17:55 PST, Owen DeLong said:
> If the vulnerability cannot be corrected through a vendor patch, then,
> one has to wonder what, exactly the vulnerability is.
Not necessarily - it's unclear they mean "the vuln innately can't be fixed
by a mere patch, because it's a social engineering issue", or "the vuln can't
be fixed because the vendor has not yet shipped a patch for some reason".
--==_Exmh_1202848078_2949P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQFHsgFOcC3lWbTT17ARAqM7AKDU3IzDaBpCfaE5kzPOKxXdYgzO7wCg7DXx
WIlObqIdEaUApvnpOCEm/AM=
=A/wB
-----END PGP SIGNATURE-----
--==_Exmh_1202848078_2949P--