Date: Tue, 16 Nov 1999 16:13:34 -0500 (EST) From: spork <spork@super-g.com> To: Mike Tancsa <mike@sentex.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Fwd: ssh-1.2.27 remote buffer overflow - exploitable (VD#7) Message-ID: <Pine.BSF.4.00.9911161611450.13005-100000@super-g.com> In-Reply-To: <3.0.5.32.19991116152108.0170f850@staff.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 16 Nov 1999, Mike Tancsa wrote: > I cant help you with OpenSSH, but the patches for sshd have been commited > to fix the exploit in question. It seems www.ssh.fi has removed one of the patches necessary to compile the port (fetch: patch-ssh-1.2.27-bsd.tty.chown: www.ssh.fi: HTTP server returned error code 404). Anyone have a copy of this that could be put up on ftp.freebsd.org under distfiles? Charles > ---Mike > ------------------------------------------------------------------------ > Mike Tancsa, tel +1 519 651 3400 > Network Administrator, mike@sentex.net > Sentex Communications www.sentex.net > Cambridge, Ontario Canada > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.00.9911161611450.13005-100000>