Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Andreas Bogk (andreasandreas.org)
Date: Fri Apr 10 2009 - 07:21:05 CDT
Marcus Meissner schrieb:
>> fixing a remotely exploitable buffer overflow vulnerability in the
>> CIFS protocol.
> assuming a malicious server.
Right. And assuming you can get the user to click on a link like
Unfortunately, this is a realistic attack scenario.
> Even we as Linux distributors should probably set some people up to
> study the .stable releases for such things.
I think you absolutely have to, if you want to provide professional
services to customers. As if you hadn't enough work to do already...
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/