>In this case, we took the action to document that it was fixed and told<br>>users they should upgrade (and why), because I don't believe this<br>>particular issue was reported by an auditing company <br><br>it would have been nice to know a problem existed in chan_sip (on the website, without having to ask or searching the commits list) and great if a advisory was posted to one or all of the popular security mailing lists.
<br><br>>If you want someone to post an analysis<br>>of what the problem was and show you how to exploit it, contact them<br>>(they seem to be interested in getting paid for fixing people's systems<br>>anyway <G>).
<br><br>when i was scanning <a href="http://seclists.org">seclists.org</a> earlier this morning I saw that there was a exploit tool for this vulnerability published and available .. and i don't think anyone here is making money off the security problems in the code.. if anything the inverse is true losing money in lost customers who can be effected by this sort of problem.
<br><br><br><div><span class="gmail_quote">On 3/4/07, <b class="gmail_sendername">Kevin P. Fleming</b> <<a href="mailto:kpfleming@digium.com">kpfleming@digium.com</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Matthew Rubenstein wrote:<br>> This security reality is well known in the programming industry. I'm<br>> disappointed to see Digium acting as if it weren't.<br><br>What is obscured? We clearly stated that the vulnerability existed, the
<br>patch to fix it was public, the release that contained that patch was<br>public.<br><br>You would prefer that we enable people who don't have a clue how to<br>write an exploit to write one anyway by giving them instructions? How
<br>does that benefit anyone? Your comments imply that we are denying that<br>the problem exists, or hiding what the fix was. Nothing could be further<br>from the truth.<br><br>Every single vulnerability we have corrected since I joined Digium
<br>(which, I believe, is now five) was reported to us privately, fixed<br>quickly with an open-source patch as we always do, and then (except for<br>this last one) the company that found the vulnerability made a press<br>
release/security advisory detailing what the flaw was and documenting<br>when/how it was fixed, what versions were affected, and what users<br>should do to protect themselves.<br><br>In this case, we took the action to document that it was fixed and told
<br>users they should upgrade (and why), because I don't believe this<br>particular issue was reported by an auditing company so there won't be<br>an independent release about it. If you want someone to post an analysis
<br>of what the problem was and show you how to exploit it, contact them<br>(they seem to be interested in getting paid for fixing people's systems<br>anyway <G>).<br>_______________________________________________
<br>--Bandwidth and Colocation provided by <a href="http://Easynews.com">Easynews.com</a> --<br><br>asterisk-dev mailing list<br>To UNSUBSCRIBE or update options visit:<br> <a href="http://lists.digium.com/mailman/listinfo/asterisk-dev">
http://lists.digium.com/mailman/listinfo/asterisk-dev</a><br></blockquote></div><br>