[
Date Prev
][
Date Next
][
Thread Prev
][
Thread Next
][
Date Index
][
Thread Index
]
Re: assignments for malware
-
To
: Kurt Seifried <
kurt@seifried.org
>
-
Subject
: Re: assignments for malware
-
From
: jericho <
jericho@attrition.org
>
-
Date
: Mon, 13 Aug 2018 14:44:51 -0500
-
Authentication-results
: spf=none (sender IP is 192.52.194.235) smtp.mailfrom=attrition.org; imc.mitre.org; dkim=none (message not signed) header.d=none;imc.mitre.org; dmarc=none action=none header.from=attrition.org;
-
Cc
: CVE Editorial Board <
cve-editorial-board-list@mitre.org
>
-
Delivery-date
: Mon Aug 13 15:54:23 2018
-
In-reply-to
: <CABqVa3-HVfo_6jRbrTpOYB=Kp-QsvDUa8k5VOhGo8Aa805Wn=A@mail.gmail.com>
-
References
: <
alpine.LNX.2.20.1808131148090.14361@forced.attrition.org
> <CABqVa38yfbG7dSZ3Fz=VVCaSFoCSUGma7vUF7ramQHqw6N3UiQ@mail.gmail.com> <
alpine.LNX.2.20.1808131431070.14361@forced.attrition.org
> <CABqVa3-HVfo_6jRbrTpOYB=Kp-QsvDUa8k5VOhGo8Aa805Wn=A@mail.gmail.com>
-
Spamdiagnosticmetadata
: NSPM
-
Spamdiagnosticoutput
: 1:99
-
User-agent
: Alpine 2.20 (LNX 67 2015-01-07)
On Mon, 13 Aug 2018, Kurt Seifried wrote:
: Depending on how the names are parsed and how the namespace is
managed (or
: not) it can actually be attacked in some cases, through automated
: dependancy resolvers. And again, if there's malicious code being
: distributed and used is there some specific reason we don't want to
tell
: people about it, and would rather ignore it?
The quick answer is 'yes', volume alone. Trying to track any site
distributing malware would be extensive to say the least.