Bugtraq mailing list archives
Re: Remote DoS Attack in Eeye Iris 1.01 and SpyNet CaptureNet v3.12 Vulnerability
From: Dan Harkless <dan-bugtraq () DILVISH SPEED NET>
Date: Thu, 31 Aug 2000 17:50:08 -0700
"Jay D. Dyson" <jdyson () TREACHERY NET> writes:
I don't typically do this, but I feel I must question the validity
(and even the value) of issuing a DoS advisory on products that are either
in Beta or no-longer-supported.
That a product is in Beta means that the vendor has a distinctly
open-door policy on any bug reports regarding the software. Beta == Bugs.
No surprise there. ...Yet when a product is no longer supported, issuing
a DoS exploit against it isn't only yesterday's news...it's slapping the
jellied *remains* of a dead horse.
If the vulnerability is serious (e.g. can get root access -- DoS only affecting the product probably would not qualify), I see no problem with reporting bugs in beta software. Some software stays in 0.x mode for years. And just because a product is no longer supported doesn't mean it's not in wide use. A lot of software becomes stable, goes into wide use, and then there comes a time where there's no official maintainer, or the official maintainer is unresponsive. For instance, if someone found a glaring security hole in obtuse.com's smtpd, which isn't being actively supported (I've contributed patches to them and have never received any reply), I'd want to hear about it. ---------------------------------------------------------------------- Dan Harkless | To prevent SPAM contamination, please dan-bugtraq () dilvish speed net | do not mention this private email SpeedGate Communications, Inc. | address in Usenet posts. Thank you.
Current thread:
- Re: FW: Remote DoS Attack in Eeye Iris 1.01 and SpyNet CaptureNet v3.12 Vulnerability Marc Maiffret (Aug 31)
