Date: Wed, 03 Oct 2001 08:03:38 -0400 From: Mike Tancsa <mike@sentex.net> To: security@freebsd.org Subject: remote root exploit (was Re: cvs commit: ports/ftp/wu-ftpd Makefile ports/ftp/wu-ftpd/filespatch-aa) Message-ID: <ggvlrtsh0hg1f39kkh8agm4f8hmkv3e382@4ax.com> In-Reply-To: <SEN.1001790192.663145501@news.sentex.net> References: <SEN.1001790192.663145501@news.sentex.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Does anyone know if these OPIE fixes were / are root exploitable ? It = was possible to sig 11 wu-ftpd remotely prior to this patch. ---Mike On Sat, 29 Sep 2001 19:03:12 +0000 (UTC), in sentex.lists.freebsd.cvs you wrote: >ache 2001/09/29 12:03:03 PDT > > Modified files: > ftp/wu-ftpd Makefile=20 > ftp/wu-ftpd/files patch-aa=20 > Log: > Fix the case when opie keys not used > =20 > Revision Changes Path > 1.38 +2 -2 ports/ftp/wu-ftpd/Makefile > 1.15 +53 -17 ports/ftp/wu-ftpd/files/patch-aa > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe cvs-all" in the body of the message Mike Tancsa (mdtancsa@sentex.net) =09 Sentex Communications Corp, =09 Waterloo, Ontario, Canada "Given enough time, 100 monkeys on 100 routers=20 could setup a national IP network." (KDW2) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?ggvlrtsh0hg1f39kkh8agm4f8hmkv3e382>