From owner-freebsd-security Tue May 4 13:53: 2 1999 Delivered-To: freebsd-security@freebsd.org Received: from rover.village.org (rover.village.org [204.144.255.49]) by hub.freebsd.org (Postfix) with ESMTP id 925B415134 for ; Tue, 4 May 1999 13:53:00 -0700 (PDT) (envelope-from imp@harmony.village.org) Received: from harmony.village.org (harmony.village.org [10.0.0.6]) by rover.village.org (8.9.3/8.9.3) with ESMTP id OAA11190; Tue, 4 May 1999 14:52:16 -0600 (MDT) (envelope-from imp@harmony.village.org) Received: from harmony.village.org (localhost.village.org [127.0.0.1]) by harmony.village.org (8.9.3/8.8.3) with ESMTP id OAA04643; Tue, 4 May 1999 14:52:12 -0600 (MDT) Message-Id: <199905042052.OAA04643@harmony.village.org> To: Brett Glass Subject: Re: Claimed remote reboot exploit: Real or bogus? Cc: "David G. Andersen" , security@FreeBSD.ORG In-reply-to: Your message of "Mon, 03 May 1999 17:29:20 MDT." <4.2.0.37.19990503172000.04f63ee0@localhost> References: <4.2.0.37.19990503172000.04f63ee0@localhost> <4.2.0.37.19990503171021.04dd6630@localhost> Date: Tue, 04 May 1999 14:52:12 -0600 From: Warner Losh Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <4.2.0.37.19990503172000.04f63ee0@localhost> Brett Glass writes: : Still, the release of 3.2-R is nigh, and we DO want to install that : one. So, we'd like to see the exploit identified and squashed before : 3.2-R goes out the door. I'm real keen on that as well. If anybody gets a copy of an exploit, please forward it to the security officer with explicit instructions on how to run it. I've had a few exploits come accross recently that have said they were bad, but weren't trivial to run. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message