From owner-freebsd-security Wed Nov 29 2:36:25 2000 Delivered-To: freebsd-security@freebsd.org Received: from mailgw1.netvision.net.il (mailgw1.netvision.net.il [194.90.1.14]) by hub.freebsd.org (Postfix) with ESMTP id BB71B37B698; Wed, 29 Nov 2000 02:36:22 -0800 (PST) Received: from alchemy.oven.org (ras9-p162.hfa.netvision.net.il [62.0.104.162]) by mailgw1.netvision.net.il (8.9.3/8.9.3) with ESMTP id MAA03971; Wed, 29 Nov 2000 12:36:20 +0200 (IST) Received: (from mapc@localhost) by alchemy.oven.org (8.11.1/8.11.1) id eATAaJg74630; Wed, 29 Nov 2000 12:36:19 +0200 (IST) (envelope-from mapc) Date: Wed, 29 Nov 2000 12:36:19 +0200 From: Roman Shterenzon To: freebsd-security@freebsd.org Cc: obrien@freebsd.org, ache@freebsd.org Subject: bash vulnerability Message-ID: <20001129123448.A74595@alchemy.oven.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hi, The bash seems vulnerable to the symlink attack as well: http://www.securityfocus.com/bid/2006 --Roman Shterenzon, UNIX System Administrator and Consultant [ Xpert UNIX Systems Ltd., Herzlia, Israel. Tel: +972-9-9522361 ] To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message