From owner-freebsd-questions Fri Oct 6 18:21:30 2000 Delivered-To: freebsd-questions@freebsd.org Received: from munich.v-net.org (u57n248.hfx.eastlink.ca [24.222.57.248]) by hub.freebsd.org (Postfix) with ESMTP id A097D37B502 for ; Fri, 6 Oct 2000 18:21:21 -0700 (PDT) Received: from unisys (3l33t-1@Windozzze [192.168.8.2]) by munich.v-net.org (8.9.3/8.9.3) with SMTP id WAA44218 for ; Fri, 6 Oct 2000 22:21:10 -0300 (ADT) (envelope-from matt@researcher.com) From: "Matt Rudderham" To: Subject: Finger Daemon Security Date: Fri, 6 Oct 2000 22:19:36 -0300 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) Importance: Normal X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Hi All, I've read a lot of things about hackers using buffer overflows and the like to exploit the finger daemon, although whenever I see any details of it, it always appears to be older versions. I was wonder what the general concensus is around here on whether or not finger recent FreeBSD versions(3.x+) are inherently evil:) Thanks, Matt Rudderham matt@researcher.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message