Date: Tue, 24 Jul 2001 15:42:29 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Wade Majors <wade@ezri.org> Cc: security@freebsd.org Subject: Re: telnetd remote root exploit released Message-ID: <20010724154228.A36368@xor.obsecurity.org> In-Reply-To: <FKEGLODDJMLHNKFFPPKDMEIOCGAA.wade@ezri.org>; from wade@ezri.org on Tue, Jul 24, 2001 at 12:54:26PM -0400 References: <5.1.0.14.0.20010724124021.078d1ec0@marble.sentex.ca> <FKEGLODDJMLHNKFFPPKDMEIOCGAA.wade@ezri.org>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Tue, Jul 24, 2001 at 12:54:26PM -0400, Wade Majors wrote: > This is the same one we are all patched against now, right? If you applied the patch from the advisory, not the one floating around on this list last week, yes. Kris [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7XfnUWry0BWjoQKURAloTAJ93lJxr9dspo0M+mLXpGWw0+vvFTwCdGaSN k0a6xhxfjXRrRiKgZ19QaEM= =AEG5 -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010724154228.A36368>
