From owner-freebsd-security Wed Jul 25 14:29:56 2001 Delivered-To: freebsd-security@freebsd.org Received: from wasabi.sushigoth.com (dsl081-059-169.sfo1.dsl.speakeasy.net [64.81.59.169]) by hub.freebsd.org (Postfix) with ESMTP id 6380737B401 for ; Wed, 25 Jul 2001 14:29:54 -0700 (PDT) (envelope-from bob@antepenultimate.org) Received: from localhost (robert@localhost) by wasabi.sushigoth.com (8.11.1/8.11.1) with ESMTP id f6PLNZW05258 for ; Wed, 25 Jul 2001 14:23:35 -0700 (PDT) Date: Wed, 25 Jul 2001 14:23:35 -0700 (PDT) From: bob X-X-Sender: To: FreeBSD Security Subject: Telnet exploit & 3.4-RELEASE Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org What is the best way for me to secure my 3.4-Release machine from the recent telnetd exploit? I don't have physical acces to the machine (its on the other coast) and I don't have any of the cvsup packages installed. The packages and ports seem to be unavailable for this release. I'd like to just upgrade through source, but i'm not sure how to get the necessary packages. --bob To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message