Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Nov 2000 12:49:25 +0200 (IST)
From:      Roman Shterenzon <roman@xpert.com>
To:        Nevermind <never@nevermind.kiev.ua>
Cc:        <freebsd-security@freebsd.org>
Subject:   Re: bash vulnerability
Message-ID:  <Pine.LNX.4.30.0011291248260.19606-100000@jamus.xpert.com>
In-Reply-To: <20001129124057.M17181@nevermind.kiev.ua>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 29 Nov 2000, Nevermind wrote:

> Hello, Roman Shterenzon!
>
> On Wed, Nov 29, 2000 at 12:36:19PM +0200, you wrote:
>
> > Hi,
> > The bash seems vulnerable to the symlink attack as well:
> > http://www.securityfocus.com/bid/2006
> Where have you seen bash or FreeBSD?

Installed from /usr/ports/shells/bash2 (or bash1).
I don't know if the shipping /bin/sh is vulnerable.

--Roman Shterenzon, UNIX System Administrator and Consultant
[ Xpert UNIX Systems Ltd., Herzlia, Israel. Tel: +972-9-9522361 ]



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.4.30.0011291248260.19606-100000>