Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 30 May 2002 00:58:47 +0100
From:      Dominic Marks <dominic_marks@btinternet.com>
To:        FreeBSD-gnats-submit@FreeBSD.org, freebsd-ports@FreeBSD.org
Subject:   Re: ports/38716: SECURITY UPDATE: security/fragroute
Message-ID:  <20020530005847.A343@host217-39-141-165.in-addr.btop>
In-Reply-To: <200205292340.g4TNe2722198@freefall.freebsd.org>; from FreeBSD-gnats-submit@FreeBSD.org on Wed, May 29, 2002 at 04:40:02PM -0700
References:  <20020529233040.02D6637E@host217-39-111-112.in-addr.btopenworld.com> <200205292340.g4TNe2722198@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,

 http://www.irssi.org/?page=backdoor

Describes the compromise, it only affects machines on which the
configure script is executed. The binary itself is unmodified.

Thanks!
-- 
Dominic

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020530005847.A343>