From owner-freebsd-security Fri Jun 23 9:21:23 2000 Delivered-To: freebsd-security@freebsd.org Received: from molybdenum.systems.cais.net (molybdenum.systems.cais.net [205.177.9.248]) by hub.freebsd.org (Postfix) with ESMTP id A5C6A37B764 for ; Fri, 23 Jun 2000 09:21:17 -0700 (PDT) (envelope-from herb@cais.net) Received: from localhost (localhost [127.0.0.1]) by molybdenum.systems.cais.net (8.9.3/8.9.3) with ESMTP id MAA17570 for ; Fri, 23 Jun 2000 12:39:02 -0400 (EDT) Date: Fri, 23 Jun 2000 12:39:02 -0400 (EDT) From: "Herbert J. McNew" X-Sender: herb@molybdenum.systems.cais.net To: security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-00:23.ip-options In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Maybe I missed it, but does anyone have an exploit for this yet? I have a solution (that isn's a kernel recompile) that I'd like to test, but have no way of doing so without an exploit. Thanks. _____________________ Herb McNew Systems Administrator CAIS Internet (703) 247-6270 herb@cais.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message