From owner-freebsd-questions Fri Apr 6 16: 2: 3 2001 Delivered-To: freebsd-questions@freebsd.org Received: from email.accessus.net (support.accessus.net [207.206.171.31]) by hub.freebsd.org (Postfix) with ESMTP id E510537B42C for ; Fri, 6 Apr 2001 16:02:00 -0700 (PDT) (envelope-from petmecky@support.accessus.net) Received: from [207.206.171.30] (account petmecky HELO capella) by email.accessus.net (CommuniGate Pro SMTP 3.4.3) with ESMTP id 92103 for freebsd-questions@freebsd.org; Fri, 06 Apr 2001 18:01:59 -0500 Message-ID: <007701c0beed$96096aa0$1eabcecf@accessus.net> From: "Steven Petmecky" To: Subject: NTPD 4.0.99k Patch? Date: Fri, 6 Apr 2001 18:01:59 -0500 Organization: AccessUS MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0074_01C0BEC3.AD11D0E0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4522.1200 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200 Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG This is a multi-part message in MIME format. ------=_NextPart_000_0074_01C0BEC3.AD11D0E0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Does anyone have a fully patched tarball of the ntpd 4.0.99k FreeBSD = port, that fixes the remote buffer overflow exploit? I've got = timeservers I really need to put back into service. ------=_NextPart_000_0074_01C0BEC3.AD11D0E0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Does anyone have a fully patched = tarball of the=20 ntpd 4.0.99k FreeBSD port, that fixes the remote buffer overflow = exploit? I've=20 got timeservers I really need to put back into service.
 
 
 
------=_NextPart_000_0074_01C0BEC3.AD11D0E0-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message