From owner-freebsd-security Mon Jul 30 7:38:57 2001 Delivered-To: freebsd-security@freebsd.org Received: from federation.addy.com (federation.addy.com [208.11.142.20]) by hub.freebsd.org (Postfix) with ESMTP id 56CA637B405 for ; Mon, 30 Jul 2001 07:38:55 -0700 (PDT) (envelope-from jim@federation.addy.com) Received: from localhost (jim@localhost) by federation.addy.com (8.9.3/8.9.3) with ESMTP id KAA68897 for ; Mon, 30 Jul 2001 10:39:14 -0400 (EDT) (envelope-from jim@federation.addy.com) Date: Mon, 30 Jul 2001 10:39:14 -0400 (EDT) From: Jim Sander Cc: freebsd-security@FreeBSD.ORG Subject: Re: Telnet exploit & 3.4-RELEASE In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org > Paul Hart wrote: > The exploit posted to Bugtraq DOES work on FreeBSD 3.4-RELEASE but only if > you selected to install an encrypting telnetd when you set the machine up. > [...] > The "regular" telnetd still has the overflow (which may or may not be > exploitable) Exactly the kind of info I was looking for. My tests with the patched non-crypto telnetd seem to indicate all the problems are fixed, but again that may be my own lack of understanding. Thanks to you, and to the others that replied off-list with other information, both valuable and simply amusing. -=Jim=- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message