From owner-freebsd-security Sun Nov 1 15:58:17 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA28950 for freebsd-security-outgoing; Sun, 1 Nov 1998 15:58:17 -0800 (PST) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from time.cdrom.com (time.cdrom.com [204.216.27.226]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id PAA28944 for ; Sun, 1 Nov 1998 15:58:14 -0800 (PST) (envelope-from jkh@time.cdrom.com) Received: from time.cdrom.com (jkh@localhost.cdrom.com [127.0.0.1]) by time.cdrom.com (8.8.8/8.8.8) with ESMTP id PAA21424; Sun, 1 Nov 1998 15:58:25 -0800 (PST) (envelope-from jkh@time.cdrom.com) To: "Matthew N. Dodd" cc: freebsd-security@FreeBSD.ORG Subject: Re: SSH vsprintf patch. (You've been warned Mr. Glass) In-reply-to: Your message of "Sun, 01 Nov 1998 18:42:13 EST." Date: Sun, 01 Nov 1998 15:58:25 -0800 Message-ID: <21420.909964705@time.cdrom.com> From: "Jordan K. Hubbard" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > Look for details on this tomorrow but here is a patch that addresses the > vsprintf calls in ssh 1.2.26. Is there a provable exploit for this also? - Jordan To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message