[102413] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IBM report reviews Internet crime

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Feb 12 15:29:59 2008

To: Owen DeLong <owen@delong.com>
Cc: michael.dillon@bt.com, nanog@nanog.org
In-Reply-To: Your message of "Tue, 12 Feb 2008 11:17:55 PST."
             <7C2098E2-1A14-451D-8CC5-6C58D3C214F6@delong.com>
From: Valdis.Kletnieks@vt.edu
Date: Tue, 12 Feb 2008 15:27:58 -0500
Errors-To: owner-nanog@merit.edu


--==_Exmh_1202848078_2949P
Content-Type: text/plain; charset=us-ascii

On Tue, 12 Feb 2008 11:17:55 PST, Owen DeLong said:

> If the vulnerability cannot be corrected through a vendor patch, then,
> one has to wonder what, exactly the vulnerability is.

Not necessarily - it's unclear they mean "the vuln innately can't be fixed
by a mere patch, because it's a social engineering issue", or "the vuln can't
be fixed because the vendor has not yet shipped a patch for some reason".


--==_Exmh_1202848078_2949P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQFHsgFOcC3lWbTT17ARAqM7AKDU3IzDaBpCfaE5kzPOKxXdYgzO7wCg7DXx
WIlObqIdEaUApvnpOCEm/AM=
=A/wB
-----END PGP SIGNATURE-----

--==_Exmh_1202848078_2949P--


home help back first fref pref prev next nref lref last post