[LUAU] so much for OpenBSD
Jim Thompson
jim at netgate.com
Mon Aug 6 02:09:21 PDT 2007
and their over-hyped "security" focus. They can't even behave
responsibly when a remote execution bug shows up.
http://www.coresecurity.com/index.php5?
module=ContentMod&action=item&id=1703
(Anyone else remember Clinton's "deny deny deny"?)
They've now been forced to change their tagline to, "Only two remote
holes in the default install, in more than 10 years!"
(The previous hole was an OpenSSH exploit found by Mark Dowd in June
2002.)
Gee, it could be, "OpenBSD: exploitable every five years, thus far!"
they even won an award for their bad behavior: http://pwnie-
awards.org/winners.html:
---
Pwnie for Lamest Vendor Response
Awarded to the vendor who mishandled a security vulnerability most
spectacularly.
OpenBSD IPv6 mbuf kernel buffer overflow (CVE-2007-1365)
OpenBSD team
The OpenBSD team refused to acknowledge the bug as a security
vulnerability and issued a "reliability fix" for it.
A week later Core Security had developed proof of concept code that
demonstrated remote code execution.
Read the full timeline and quotes in the Core advisory (above).
More information about the LUAU
mailing list