Date: Fri, 12 Jan 2001 18:45:29 -0800 From: Kris Kennaway <kris@FreeBSD.ORG> To: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca> Cc: freebsd-security@FreeBSD.ORG Subject: Re: [!H] Tcpdump 3.5.2 remote root vulnerability (fwd) Message-ID: <20010112184529.B25168@citusc.usc.edu> In-Reply-To: <200101122058.f0CKw7I11863@cwsys.cwsent.com>; from Cy.Schubert@uumail.gov.bc.ca on Fri, Jan 12, 2001 at 12:57:57PM -0800 References: <200101122058.f0CKw7I11863@cwsys.cwsent.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--dc+cDN39EJAMEtIO Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Fri, Jan 12, 2001 at 12:57:57PM -0800, Cy Schubert - ITSD Open Systems Group wrote: > This affects our tcpdump. Well..it affects old versions of tcpdump before we patched the vulnerability (which I discovered and which we initially publicized, BTW), and released the advisory describing it. All this post is is a canned exploit for the known, long fixed problem..nothing to worry about unless you don't act on the security advisories which are released. Kris --dc+cDN39EJAMEtIO Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE6X8FJWry0BWjoQKURAnfTAKCZFNZsp+g4id/ruNL4iG0+/WJEswCbBgPe nSOV1oAcvGM1RTaCuhOWWbM= =c3Qx -----END PGP SIGNATURE----- --dc+cDN39EJAMEtIO-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010112184529.B25168>