[Full-Disclosure] iDEFENSE Security Advisory 11.08.02b: Non-Explicit Path Vulnerability in QNX Neutrino RTOS
From: David Endler (email@example.com)
- Next message: John Cartwright: "[Full-Disclosure] List Charter"
- Previous message: Ulf Harnhammar: "[Full-Disclosure] Re: A technique to mitigate cookie-stealing XSS attacks"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: firstname.lastname@example.org (David Endler) Date: Sat, 9 Nov 2002 11:21:59 -0500
Thanks for pointing out the typo, the date should have read
January, 2003. The advisory has been updated on the web site.
> -----Original Message-----
> From: Erik Parker [mailto:email@example.com]
> Sent: Saturday, November 09, 2002 5:32 AM
> To: David Endler
> Cc: firstname.lastname@example.org
> Subject: Re: [Full-Disclosure] iDEFENSE Security Advisory
> Non-Explicit Path Vulnerability in QNX Neutrino RTOS
> > VI. VENDOR FIX
> > QNX Neutrino RTOS 6.2.1, which is slated to be released in
> > 2002, should fix this vulnerability. According to QNX,
> > customers can contact their sales rep for an advance copy.
> Damn, I need a dev team that can create patches 11 months in
> the past.. That's
> what I call being on top of their game.
> You're pathetic David.