Date: Tue, 24 Jul 2001 15:42:29 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Wade Majors <wade@ezri.org> Cc: security@freebsd.org Subject: Re: telnetd remote root exploit released Message-ID: <20010724154228.A36368@xor.obsecurity.org> In-Reply-To: <FKEGLODDJMLHNKFFPPKDMEIOCGAA.wade@ezri.org>; from wade@ezri.org on Tue, Jul 24, 2001 at 12:54:26PM -0400 References: <5.1.0.14.0.20010724124021.078d1ec0@marble.sentex.ca> <FKEGLODDJMLHNKFFPPKDMEIOCGAA.wade@ezri.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--n8g4imXOkfNTN/H1 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Tue, Jul 24, 2001 at 12:54:26PM -0400, Wade Majors wrote: > This is the same one we are all patched against now, right? If you applied the patch from the advisory, not the one floating around on this list last week, yes. Kris --n8g4imXOkfNTN/H1 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7XfnUWry0BWjoQKURAloTAJ93lJxr9dspo0M+mLXpGWw0+vvFTwCdGaSN k0a6xhxfjXRrRiKgZ19QaEM= =AEG5 -----END PGP SIGNATURE----- --n8g4imXOkfNTN/H1-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010724154228.A36368>