From owner-freebsd-ports Sun Jun 25 12:20: 8 2000 Delivered-To: freebsd-ports@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (Postfix) with ESMTP id DA1D937B536 for ; Sun, 25 Jun 2000 12:20:06 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id MAA00924; Sun, 25 Jun 2000 12:20:06 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Date: Sun, 25 Jun 2000 12:20:06 -0700 (PDT) Message-Id: <200006251920.MAA00924@freefall.freebsd.org> To: freebsd-ports@FreeBSD.org Cc: From: Will Andrews Subject: Re: ports/19503: isc-dhcp3 port root exploit Reply-To: Will Andrews Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR ports/19503; it has been noted by GNATS. From: Will Andrews To: Cy.Schubert@uumail.gov.bc.ca Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: ports/19503: isc-dhcp3 port root exploit Date: Sun, 25 Jun 2000 15:09:50 -0400 On Sun, Jun 25, 2000 at 08:20:26AM -0700, Cy.Schubert@uumail.gov.bc.ca wrote: > >Synopsis: isc-dhcp3 root exploit isc-dhcp3 is not vulnerable, according to your quote. However, isc-dhcp2 IS vulnerable and needs to be updated. -- Will Andrews GCS/E/S @d- s+:+>+:- a--->+++ C++ UB++++ P+ L- E--- W+++ !N !o ?K w--- ?O M+ V-- PS+ PE++ Y+ PGP+>+++ t++ 5 X++ R+ tv+ b++>++++ DI+++ D+ G++>+++ e->++++ h! r-->+++ y? To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message