From owner-freebsd-security Thu Dec 14 17:57:52 2000 From owner-freebsd-security@FreeBSD.ORG Thu Dec 14 17:57:50 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from peitho.fxp.org (peitho.fxp.org [209.26.95.40]) by hub.freebsd.org (Postfix) with ESMTP id 7108737B402 for ; Thu, 14 Dec 2000 17:57:50 -0800 (PST) Received: by peitho.fxp.org (Postfix, from userid 1501) id D53F91360E; Thu, 14 Dec 2000 20:57:49 -0500 (EST) Date: Thu, 14 Dec 2000 20:57:49 -0500 From: Chris Faulhaber To: Cy Schubert - ITSD Open Systems Group Cc: desmo@bandwidth.org, freebsd-security@freebsd.org Subject: Re: LPRng remote root exploit (fwd) Message-ID: <20001214205749.A48180@peitho.fxp.org> Mail-Followup-To: Chris Faulhaber , Cy Schubert - ITSD Open Systems Group , desmo@bandwidth.org, freebsd-security@freebsd.org References: <200012150131.eBF1VPa05764@cwsys.cwsent.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: <200012150131.eBF1VPa05764@cwsys.cwsent.com>; from Cy.Schubert@uumail.gov.bc.ca on Thu, Dec 14, 2000 at 05:30:52PM -0800 Sender: cdf.lists@fxp.org Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Thu, Dec 14, 2000 at 05:30:52PM -0800, Cy Schubert - ITSD Open Systems Group wrote: > This is just a heads up. > > Anyone care to test this with our LPRng port? > *snip* > > LPRng-3.6.22/23/24 remote root exploit, enjoy. > *snip* It won't hurt to try, however, ports/sysutils/LPRng is at 3.6.26, which is supposed to fix this problem. -- Chris D. Faulhaber - jedgar@fxp.org - jedgar@FreeBSD.org -------------------------------------------------------- FreeBSD: The Power To Serve - http://www.FreeBSD.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message