Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 03 May 1999 19:40:59 -0400 (EDT)
From:      Vince Vielhaber <vev@michvhf.com>
To:        Seth <seth@freebie.dp.ny.frb.org>
Cc:        freebsd-stable@freebsd.org, security@freebsd.org
Subject:   RE: FreeBSD 3.1 remote reboot exploit (fwd)
Message-ID:  <XFMail.990503194059.vev@michvhf.com>
In-Reply-To: <Pine.BSF.4.10.9905031931170.54151-100000@freebie.dp.ny.frb.org>

next in thread | previous in thread | raw e-mail | index | archive | help

On 03-May-99 Seth wrote:
> Just hit bugtraq, figured people might want to get in touch or start
> digging.

It's typically in bad taste to post it to BugTraq before contacting the
vendor.

Vince.
-- 
==========================================================================
Vince Vielhaber -- KA8CSH   email: vev@michvhf.com   flame-mail: /dev/null
       # include <std/disclaimers.h>                   TEAM-OS2
        Online Campground Directory    http://www.camping-usa.com
       Online Giftshop Superstore    http://www.cloudninegifts.com
==========================================================================




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?XFMail.990503194059.vev>