Date: Tue, 10 Oct 2000 19:13:33 -0500 (CDT) From: Mike Silbersack <silby@silby.com> To: Steve Reid <sreid@sea-to-sky.net> Cc: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>, freebsd-security@FreeBSD.ORG Subject: Re: ncurses buffer overflows (fwd) Message-ID: <Pine.BSF.4.21.0010101912540.4283-100000@achilles.silby.com> In-Reply-To: <Pine.BSF.4.21.0010101908580.4266-100000@achilles.silby.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 10 Oct 2000, Mike Silbersack wrote: > Well, the advisory states that ncurses 5.0 and before are vulnerable. It > looks like 5.1-prerelease is what 4.1+ are using. So, until we here more > from warner/kris, I'm assuming that 4.0/3.x are vulnerable, but 4.1+ is > safe. > > (The exploit didn't work for me either, FWIW.) > > Mike "Silby" Silbersack I partially retract that. It looks like 3.x doesn't use ncurses, if I'm reading cvs properly. Mike "Silby" Silbersack To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0010101912540.4283-100000>