From owner-freebsd-questions Sun Mar 30 17:01:19 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id RAA28815 for questions-outgoing; Sun, 30 Mar 1997 17:01:19 -0800 (PST) Received: from shell4.ba.best.com (root@shell4.ba.best.com [206.184.139.135]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id RAA28810 for ; Sun, 30 Mar 1997 17:01:17 -0800 (PST) Received: (from maruishi@localhost) by shell4.ba.best.com (8.8.5/8.7.3) id RAA09893; Sun, 30 Mar 1997 17:00:17 -0800 (PST) Date: Sun, 30 Mar 1997 17:00:17 -0800 (PST) Message-Id: <199703310100.RAA09893@shell4.ba.best.com> To: freebsd-questions@FreeBSD.ORG X-URL: http://www.freebsd.org/support.html X-Mailer: Lynx, Version 2.7 X-Personal_name: david From: maruishi@best.com Subject: ppp hack ? Sender: owner-questions@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk I am running FreeBSD version 2.1.5 A friend of mine said that there is some type of exploit having to do with ppp which allows the "cracker" to gain root. Does anyone know about this? Should I upgrade my current version of FreeBSD and/or apply any patches? Thank you for your time. --David