Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Feb 1999 22:13:02 +1300
From:      Andrew McNaughton <andrew@squiz.co.nz>
To:        cjclark@home.com
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: CA-99-03-FTP-Buffer-Overflows 
Message-ID:  <199902160913.WAA17654@aniwa.sky>
In-Reply-To: Your message of "Mon, 15 Feb 1999 22:13:07 CDT." <199902160313.WAA29938@cc942873-a.ewndsr1.nj.home.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
> See, 
> 
> http://www.cert.org/advisories/CA-99-03-FTP-Buffer-Overflows.html
> 
> For the full text.
> 
> Is FreeBSD vunerable? I hope that this,
> 
> > % NetBSD
> > 
> >            % NetBSD      All versions ARE NOT vulnerable.
> 
> Implies FreeBSD is neither. I know FreeBSD and NetBSD use the same
> ftp, but ftpd? Just looking for verification. Thanks.

I found it rather curious that FreeBSD's ftpd was not mentioned.  Particularly as the PGP signature's version ID said FreeBSD was used, implying that it would have been around for testing.

Andrew McNaughton




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199902160913.WAA17654>