On Tuesday, the Computer Emergency Response Team (CERT) issued an advisory that servers running the Berkeley Software Design (BSD) operating system were vulnerable to the flaw. But less attention has been paid to a possible legal battle brewing behind the scenes between TESO and a prominent security mailing list owned by security firm SecurityFocus.com. . . .
On Tuesday, the Computer Emergency Response Team (CERT) issued an advisory that servers running the Berkeley Software Design (BSD) operating system were vulnerable to the flaw. But less attention has been paid to a possible legal battle brewing behind the scenes between TESO and a prominent security mailing list owned by security firm SecurityFocus.com.

On Tuesday, a member of the Bugtraq mailing list, which boasts upwards of 50,000 subscribers, posted an exploit -- developed by TESO -- which takes advantage of the vulnerability, despite the fact that the exploit's header forbade distribution of the exploit, and gave mailing lists and Bugtraq in particular as examples.

"We did not give out the exploit to anyone and have not done so since it was written," said Sebastian, a member of TESO and the discoverer of the vulnerability. Sebastian chose to remain "pseudonymous."

The link for this article located at Internetnews [LinuxToday] is no longer available.