From owner-freebsd-questions@FreeBSD.ORG Tue Aug 17 15:00:46 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2CD1916A4CF for ; Tue, 17 Aug 2004 15:00:46 +0000 (GMT) Received: from smtp801.mail.sc5.yahoo.com (smtp801.mail.sc5.yahoo.com [66.163.168.180]) by mx1.FreeBSD.org (Postfix) with SMTP id 7246E43D39 for ; Tue, 17 Aug 2004 15:00:41 +0000 (GMT) (envelope-from addymin@pacbell.net) Received: from unknown (HELO ?192.168.1.12?) (m?chinn@pacbell.net@63.202.82.203 with plain) by smtp801.mail.sc5.yahoo.com with SMTP; 17 Aug 2004 15:00:41 -0000 Message-ID: <41221E98.9020509@pacbell.net> Date: Tue, 17 Aug 2004 08:04:56 -0700 From: Mike User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.2) Gecko/20040803 X-Accept-Language: en-us, en MIME-Version: 1.0 To: stheg olloydson , freebsd-questions References: <20040816214027.93749.qmail@web61302.mail.yahoo.com> In-Reply-To: <20040816214027.93749.qmail@web61302.mail.yahoo.com> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: How to increase scrollback for FreeBSD-4.10 X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: addymin@pacbell.net List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Aug 2004 15:00:46 -0000 stheg olloydson wrote: > you said: > > >>I have a FBSD-4.10 system that I log into using PuTTY (on a Win2K >>workstation). I am able to set PuTTY's scrollback to 1200 lines. > > > > Hello, > > Unfortunately, I do not have a solution to your problem. I just wanted > to pass along some information concerning PuTTY from a security news > letter to which I subscribe: > > >>04.31.4 CVE: Not Available >>Platform: Third Party Windows Apps >>Title: PuTTY Remote Buffer Overflow >>Description: PuTTY is a free Telnet and SSH client. It has been >>reported that PuTTY is subject to a pre-authentication buffer overflow >>that can allow malicious servers to execute code on a client machine >>as it attempts to negotiate connection. PuTTY 0.54 and previous >>versions are vulnerable. >>Ref: > > http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10 > > Note that the URL may have wrapped. > > Regards, > > Stheg Stehg Thanks for the security note/update on putty! I'm using version 5.5 now. Michael > > > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - 50x more storage than other providers! > http://promotions.yahoo.com/new_mail >