On Jun 7, 2006, at 5:08 AM, David Gil wrote:

severity 370576 minor
thanks


Thanks...

El mar, 06-06-2006 a las 13:01 -0400, Kevin Johnson escribió:
I have to disagree with the Severity of grave.  To exploit you need
to have register_globals set to on which has not been the default in
years.

Ok, now the bug has a minor severity. You are right, base is not
exploitable with the default installation of the package.

We have released 1.2.5 which fixes the issue and a number of
other things.

Yes, I am aware of it. We'll upload it in a few days. I've submitted the
bug report to inform the security team (testing distribution has also
base 1.2.4) and to explain more in deep the changes in the 1.2.5
changelog.


Great... I appreciate it...

It just gets under my skin when "researchers" find
problems, elevate how serious they are and never notify the
development team.

Well, I don't understand you Kevin. I know you are subscribed to the
package tracking system of acidbase, so I know that you receive all the
bugs submitted to the package too. If you don't agree with the severty
of a bug, you can always change it as I've just done.


Sorry this was not meant toward you. I was speaking of St0ke and Milw0rm. I apologize for venting at you and the bug tracking system. As too changing the severity I forgot. We have been busy around here since my new daughter arrived Monday.

Sorry for my rant,
Kevin

Regards,
David.



Thanks
Kevin
---------------------
BASE Project Lead
http://sourceforge.net/projects/secureideas
http://base.secureideas.net
The next step in IDS analysis!



Reply via email to