Date: Thu, 8 Nov 2001 07:29:17 -0600 From: "Kevin & Anita Kinsey" <k_a_kinsey@netzero.net> To: <freebsd-security@freebsd.org> Subject: Fw: Buffer overflow in lpd? Message-ID: <034101c16859$67c004e0$1e69493f@Kinsey>
next in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] from http://icat.nist.gov/icat.cfm?cvename=CAN-2001-0670 : "Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue." Was this fixed prior to 4.4-REL? Date on site is "prior to 10/3/2001." REL was Sept, correct? [-- Attachment #2 --] <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META content="text/html; charset=iso-8859-1" http-equiv=Content-Type> <META content="MSHTML 5.00.2614.3500" name=GENERATOR> <STYLE></STYLE> </HEAD> <BODY bgColor=#ffffff> <DIV><FONT face=Arial size=2>from <A href="http://icat.nist.gov/icat.cfm?cvename=CAN-2001-0670">http://icat.nist.gov/icat.cfm?cvename=CAN-2001-0670</A></FONT><FONT face=Arial size=2> :</FONT></DIV> <DIV><FONT face=Arial size=2></FONT> </DIV> <DIV><FONT face=Arial size=2>"Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue."</FONT></DIV> <DIV> </DIV> <DIV><FONT face=Arial size=2>Was this fixed prior to 4.4-REL? Date on site is "prior to 10/3/2001." REL was Sept, correct?</FONT></DIV></BODY></HTML>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?034101c16859$67c004e0$1e69493f>
