Date: Fri, 6 Apr 2001 18:01:59 -0500 From: "Steven Petmecky" <petmecky@support.accessus.net> To: <freebsd-questions@freebsd.org> Subject: NTPD 4.0.99k Patch? Message-ID: <007701c0beed$96096aa0$1eabcecf@accessus.net>
next in thread | raw e-mail | index | archive | help
This is a multi-part message in MIME format. ------=_NextPart_000_0074_01C0BEC3.AD11D0E0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Does anyone have a fully patched tarball of the ntpd 4.0.99k FreeBSD = port, that fixes the remote buffer overflow exploit? I've got = timeservers I really need to put back into service. ------=_NextPart_000_0074_01C0BEC3.AD11D0E0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META http-equiv=3DContent-Type content=3D"text/html; = charset=3Diso-8859-1"> <META content=3D"MSHTML 5.50.4611.1300" name=3DGENERATOR> <STYLE></STYLE> </HEAD> <BODY bgColor=3D#ffffff> <DIV><FONT face=3DArial size=3D2>Does anyone have a fully patched = tarball of the=20 ntpd 4.0.99k FreeBSD port, that fixes the remote buffer overflow = exploit? I've=20 got timeservers I really need to put back into service.</FONT></DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT size=3D2></FONT> </DIV></BODY></HTML> ------=_NextPart_000_0074_01C0BEC3.AD11D0E0-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?007701c0beed$96096aa0$1eabcecf>
