Date: Mon, 26 Jun 2000 06:40:04 -0700 (PDT) From: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca> To: freebsd-ports@FreeBSD.org Subject: Re: ports/19503: isc-dhcp3 port root exploit Message-ID: <200006261340.GAA91530@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/19503; it has been noted by GNATS. From: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca> To: Will Andrews <andrews@technologist.com> Cc: Cy.Schubert@uumail.gov.bc.ca, FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: ports/19503: isc-dhcp3 port root exploit Date: Mon, 26 Jun 2000 06:32:55 -0700 In message <20000625150950.A85886@argon.gryphonsoft.com>, Will Andrews writes: > On Sun, Jun 25, 2000 at 08:20:26AM -0700, Cy.Schubert@uumail.gov.bc.ca wrote: > > >Synopsis: isc-dhcp3 root exploit > > isc-dhcp3 is not vulnerable, according to your quote. However, > isc-dhcp2 IS vulnerable and needs to be updated. The advisory makes the statement, "this exploit is present in all versions of the ISC DHCP client prior to 2.0pl1 and 3.0b1pl14". Because of this statement, the version 2 port needs to be updated to 2.0pl1 and the version 3 port needs to be updated to 3.0b1pl14. Regards, Phone: (250)387-8437 Cy Schubert Fax: (250)387-5766 Team Leader, Sun/DEC Team Internet: Cy.Schubert@osg.gov.bc.ca Open Systems Group, ITSD, ISTA Province of BC To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006261340.GAA91530>