From owner-freebsd-security Tue Jul 24 15:42:34 2001 Delivered-To: freebsd-security@freebsd.org Received: from obsecurity.dyndns.org (adsl-64-169-104-149.dsl.lsan03.pacbell.net [64.169.104.149]) by hub.freebsd.org (Postfix) with ESMTP id 6647337B401 for ; Tue, 24 Jul 2001 15:42:31 -0700 (PDT) (envelope-from kris@obsecurity.org) Received: by obsecurity.dyndns.org (Postfix, from userid 1000) id 9464866E04; Tue, 24 Jul 2001 15:42:29 -0700 (PDT) Date: Tue, 24 Jul 2001 15:42:29 -0700 From: Kris Kennaway To: Wade Majors Cc: security@freebsd.org Subject: Re: telnetd remote root exploit released Message-ID: <20010724154228.A36368@xor.obsecurity.org> References: <5.1.0.14.0.20010724124021.078d1ec0@marble.sentex.ca> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-md5; protocol="application/pgp-signature"; boundary="n8g4imXOkfNTN/H1" Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from wade@ezri.org on Tue, Jul 24, 2001 at 12:54:26PM -0400 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org --n8g4imXOkfNTN/H1 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Tue, Jul 24, 2001 at 12:54:26PM -0400, Wade Majors wrote: > This is the same one we are all patched against now, right? If you applied the patch from the advisory, not the one floating around on this list last week, yes. Kris --n8g4imXOkfNTN/H1 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7XfnUWry0BWjoQKURAloTAJ93lJxr9dspo0M+mLXpGWw0+vvFTwCdGaSN k0a6xhxfjXRrRiKgZ19QaEM= =AEG5 -----END PGP SIGNATURE----- --n8g4imXOkfNTN/H1-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message