Re: CVE Exploit

2011-03-09 Thread Jordon Bedwell
On 3/9/2011 1:26 PM, Timothy Ball wrote: On Wed, Mar 09, 2011 at 01:31:50AM -0800, aizaz83 hussain wrote: Dear I need your Help regarding Exploit development of CVE-2010-3872 Could you please Guide. How might this CVE-2010-3872 be exploited and how might an exploit work bwahahahahaha ... thank

Re: CVE Exploit

2011-03-09 Thread Timothy Ball
On Wed, Mar 09, 2011 at 01:31:50AM -0800, aizaz83 hussain wrote: > Dear I need your Help regarding Exploit development of CVE-2010-3872 > Could you please Guide. > How might this CVE-2010-3872 be exploited and how might an exploit work > bwahahahahaha ... thanks this was a pretty good pick-me-up

Re: sun-java6 updates for {old,}stable?

2011-03-09 Thread Alexander Reichle-Schmehl
Hi! * Jonathan Wiltshire [110309 09:38]: > The packages are non-free, so they do not get security support. They will > be in the next point release for Squeeze in a few weeks [1]. See <1299615077.9459.397.ca...@hathi.jungle.funky-badger.org> ; Squeeze point release planed for 19th of March. Be

CVE Exploit

2011-03-09 Thread aizaz83 hussain
Dear I need your Help regarding Exploit development of CVE-2010-3872 Could you please Guide. How might this CVE-2010-3872 be exploited and how might an exploit work Thanks and Regards Muhammad Hussain

Re: sun-java6 updates for {old,}stable?

2011-03-09 Thread Jonathan Wiltshire
On Wed, Mar 09, 2011 at 08:14:26AM +, Harald Weidner wrote: > This topic is already some days old but I still can't find the new > packages in the repos for squeeze and lenny. > > Is it planned to upload them on security.debian.org? And when? The packages are non-free, so they do not get secu

Re: sun-java6 updates for {old,}stable?

2011-03-09 Thread Harald Weidner
Hello, Dominic Hargreaves : >> > Are there any plans to update the sun-java6 packages in lenny and >> > squeeze for the recent floating point DoS issue? >> Yes: >> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=613723 >> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=613741 > >Great, thanks