[22782] in bugtraq

home help back first fref pref prev next nref lref last post

AOL Instant Messenger Advisory - Credits

daemon@ATHENA.MIT.EDU (Matthew Sachs)
Wed Oct 3 16:34:03 2001

Date: Wed, 3 Oct 2001 13:44:30 -0400
From: Matthew Sachs <matthewg@zevils.com>
To: bugtraq@securityfocus.com
Cc: vuln-dev@securityfocus.com
Message-ID: <20011003134430.B22429@zevils.com>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="bCsyhTFzCvuiizWE"
Content-Disposition: inline

--bCsyhTFzCvuiizWE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

I forgot to mention it in my advisory, but I'd like to thank the=20
vuln-dev mailing list subscribers for their help in researching this
vulnerability.  The problem was initially discovered and investigated
through a thread on that mailing list.

--=20
Matthew Sachs, the original nonstandard deviant
matthewg@zevils.com	http://www.zevils.com/
GPG key: 0x600A0342	PGP key: 0x93EA1151

--bCsyhTFzCvuiizWE
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)

iD8DBQE7u05+locTNGAKA0IRAg0SAKCEtUQhF6CydcQKjaThSCOMv/BhaACgvWsO
Y9AjpCA1ruw3+7BkAra5Sro=
=gf7T
-----END PGP SIGNATURE-----

--bCsyhTFzCvuiizWE--

home help back first fref pref prev next nref lref last post