Date: Thu, 31 Jul 2003 15:52:54 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Lucas Holt <luke@foolishgames.com> Cc: freebsd-questions@freebsd.org Subject: Re: WU FTPD Message-ID: <20030731225254.GB15353@rot13.obsecurity.org> In-Reply-To: <6041B5F2-C383-11D7-A62F-0030656DD690@foolishgames.com> References: <6041B5F2-C383-11D7-A62F-0030656DD690@foolishgames.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--gj572EiMnwbLXET9 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Jul 31, 2003 at 02:18:25PM -0400, Lucas Holt wrote: > There was a vulnerability released today in wu ftpd and I'm unclear if=20 > this would affect the software running on a freebsd system. It appears= =20 > to cause problems on linux 2.4.x kernels but not older kernels due to=20 > the way the compiler works. Does anyone know if this problem is=20 > exploitable on freebsd? If not, where should I ask this question? Read security@ or just update your ports collection and recompile wuftpd. Kris --gj572EiMnwbLXET9 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (FreeBSD) iD8DBQE/KZ3GWry0BWjoQKURAjL1AJ4oCgGL+xxCKGMmffB740mqWRJLdACg/RPv 7oZHQvUwf8tjVoCU9DInmmo= =KAoO -----END PGP SIGNATURE----- --gj572EiMnwbLXET9--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030731225254.GB15353>