Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 03 Oct 2001 08:03:38 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        security@freebsd.org
Subject:   remote root exploit (was Re: cvs commit: ports/ftp/wu-ftpd Makefile ports/ftp/wu-ftpd/filespatch-aa)
Message-ID:  <ggvlrtsh0hg1f39kkh8agm4f8hmkv3e382@4ax.com>
In-Reply-To: <SEN.1001790192.663145501@news.sentex.net>
References:  <SEN.1001790192.663145501@news.sentex.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi
Does anyone know if these OPIE fixes were / are root exploitable ?  It =
was
possible to sig 11 wu-ftpd remotely prior to this patch.

	---Mike

On Sat, 29 Sep 2001 19:03:12 +0000 (UTC), in sentex.lists.freebsd.cvs you
wrote:

>ache        2001/09/29 12:03:03 PDT
>
>  Modified files:
>    ftp/wu-ftpd          Makefile=20
>    ftp/wu-ftpd/files    patch-aa=20
>  Log:
>  Fix the case when opie keys not used
> =20
>  Revision  Changes    Path
>  1.38      +2 -2      ports/ftp/wu-ftpd/Makefile
>  1.15      +53 -17    ports/ftp/wu-ftpd/files/patch-aa
>
>
>To Unsubscribe: send mail to majordomo@FreeBSD.org
>with "unsubscribe cvs-all" in the body of the message

Mike Tancsa  (mdtancsa@sentex.net)	=09
Sentex Communications Corp,   	=09
Waterloo, Ontario, Canada
"Given enough time, 100 monkeys on 100 routers=20
could setup a national IP network." (KDW2)

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?ggvlrtsh0hg1f39kkh8agm4f8hmkv3e382>