From owner-freebsd-security Thu Jul 15 14:27:26 1999 Delivered-To: freebsd-security@freebsd.org Received: from magnesium.net (toxic.magnesium.net [204.188.6.238]) by hub.freebsd.org (Postfix) with SMTP id 4420E14D3E for ; Thu, 15 Jul 1999 14:27:24 -0700 (PDT) (envelope-from unfurl@magnesium.net) Received: (qmail 23781 invoked by uid 1001); 15 Jul 1999 21:27:24 -0000 Date: 15 Jul 1999 14:27:24 -0700 Date: Thu, 15 Jul 1999 14:27:24 -0700 From: Bill Swingle To: Paulo Fragoso Cc: freebsd-security@freebsd.org Subject: Re: FreeBSD exploit? Message-ID: <19990715142724.A23752@dub.net> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.95.1i In-Reply-To: ; from Paulo Fragoso on Thu, Jul 15, 1999 at 06:15:28PM -0300 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, Jul 15, 1999 at 06:15:28PM -0300, Paulo Fragoso wrote: > Hi, > > Has anyone ever read this article: > > http://www.securityfocus.com/level2/bottom.html?go=vulnerabilities&id=526 > > all version of freebsd has this problem!!! > > Paulo. Before starting the hype-engine please use the correct term. It is a _Denial of Service_ attack, not an exploit. No one is going to get root with this program. -Bill -- -=| Bill Swingle - unfurl@dub.net - unfurl@freebsd.org - bill@cdrom.com -=| "Computers are useless. They can only give you answers" Pablo Picasso To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message