From owner-freebsd-security Mon Dec 29 15:22:56 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id PAA22260 for security-outgoing; Mon, 29 Dec 1997 15:22:56 -0800 (PST) (envelope-from owner-freebsd-security) Received: from mercury.acs.unt.edu (mercury.acs.unt.edu [129.120.1.1]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id PAA22245 for ; Mon, 29 Dec 1997 15:22:46 -0800 (PST) (envelope-from john@www.cas.unt.edu) Received: from www.cas.unt.edu (www.cas.unt.edu [129.120.3.150]) by mercury.acs.unt.edu (8.8.8/8.8.8) with ESMTP id RAA22360; Mon, 29 Dec 1997 17:22:30 -0600 (CST) Received: (from john@localhost) by www.cas.unt.edu (8.8.7/8.6.9) id RAA12571; Mon, 29 Dec 1997 17:21:44 -0600 (CST) From: john Message-Id: <199712292321.RAA12571@www.cas.unt.edu> Subject: Re: Two sources for system-cracking tools To: root@transbay.net (UC Computer / Transbay.Net) Date: Mon, 29 Dec 1997 17:21:44 -0600 (CST) Cc: freebsd-security@freebsd.org In-Reply-To: <199712292140.NAA04641@transbay.net> from "UC Computer / Transbay.Net" at Dec 29, 97 01:40:10 pm X-Mailer: ELM [version 2.4 PL25 PGP3 *ALPHA*] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk 2.2.5-Stable and current were fixed as of Dec 2, 1997. > misc stuff deleted here about land and teardrop attacks. > All hail secure systems ... > > FreeBSD 2.2.5-STABLE IS vulnerable > FreeBSD 3.0-CURRENT IS vulnerable >From http://www.freebsd.org/newsflash.html 2-Dec-97 The "FOOF" bug has now been fixed in our 3.0-current and 2.2-stable branches and can either be incorporated by using the CVSup utility, as described below for the LAND attack fix