|Main Archive Page > Month Archives > full-disclosure-uk archives|
hey, how overhyped is the shit now that its in the while and proving ur ass wrong bitch?
On Wed, Jul 23, 2008 at 5:00 AM, n3td3v <firstname.lastname@example.org> wrote:
> On Fri, Jul 11, 2008 at 9:22 PM, Sandy Vagina <email@example.com> wrote:
>> n3td3v wrote:
>> > Please nominate Mr.DNS aka Dan Kaminsky for Most Overhyped Bug on the
>> > Pwnie Awards 2008.
>> Perhaps if you bothered to read anywhere close to as much as you
>> write, you would have seen that Dino, one of the judges, specifically
>> disqualified this bug from the Pwnies for being too awesome:
> Hi Sandy Vagina,
> Looks like they did a U-turn after realising how over hyped the bug actually is.
> Unspecified DNS cache poisoning vulnerability (CVE-2008-1447)
> Dan Kaminsky
> Dan Kaminsky is credited with discovering some unspecified
> vulnerabilities in DNS that allow for cache poisoning on a massive
> the-intarweb-tubes-will-burst-and-flood-your-basement scale. There has
> been massive media attention over this vulnerability and a large
> amount of backlash in the security community over the lack of details.
> When the full details of the vulnerability are revealed at BlackHat,
> the masses will decide whether the hype and secrecy were worth it.
> And, more importantly, the Pwnie Judges will vote on whether Dan gets
> the Pwnie for Most Overhyped Bug.
> All the best,
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/