From owner-freebsd-security Sat Nov 25 4:44:39 2000 Delivered-To: freebsd-security@freebsd.org Received: from smtp23.singnet.com.sg (smtp23.singnet.com.sg [165.21.101.203]) by hub.freebsd.org (Postfix) with ESMTP id 2889E37B4C5 for ; Sat, 25 Nov 2000 04:44:37 -0800 (PST) Received: from netserver01 (ad202.166.106.112.magix.com.sg [202.166.106.112]) by smtp23.singnet.com.sg (8.9.3/8.9.3) with SMTP id UAA22340 for ; Sat, 25 Nov 2000 20:44:35 +0800 (envelope-from spades@galaxynet.org) Message-Id: <3.0.32.20001125204508.01752dd0@smtp.magix.com.sg> X-Sender: spades@smtp.magix.com.sg X-Mailer: Windows Eudora Pro Version 3.0 (32) Date: Sat, 25 Nov 2000 20:45:08 +0800 To: freebsd-security@freebsd.org From: Spades Subject: Re: wuftp Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org I run FreeBSD 4.1.1-release, is it vulnerable to the wuftp exploit? I think someone tried to overflow my office server with mass anonymous login. Any idea or comments? ---------- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message