Skip site navigation (1)Skip section navigation (2)
Date:      19 Jul 2001 19:20:10 +0200
From:      Assar Westerlund <assar@FreeBSD.ORG>
To:        Ruslan Ermilov <ru@FreeBSD.ORG>
Cc:        "Jacques A. Vidrine" <n@nectar.com>, Matt Dillon <dillon@earth.backplane.com>, Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>, Mike Tancsa <mike@sentex.net>, Kris Kennaway <kris@obsecurity.org>, security@FreeBSD.ORG
Subject:   Re: FreeBSD remote root exploit ?
Message-ID:  <5l8zhk25v9.fsf@assaris.sics.se>
In-Reply-To: Ruslan Ermilov's message of "Thu, 19 Jul 2001 20:10:09 %2B0300"
References:  <200107190547.f6J5lmD66188@cwsys.cwsent.com> <200107190747.f6J7lMU71487@earth.backplane.com> <20010719102230.L27900@madman.nectar.com> <5lpuaw26kt.fsf@assaris.sics.se> <20010719201009.A61061@sunbay.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Ruslan Ermilov <ru@FreeBSD.ORG> writes:
> > I don't know if it's exploitable either.  I don't _think_ so, but I've
> > of course fixed the problem anyways.
> > 
> You mean, in netflush()?

No, in output_data() (in heimdal's telnetd/global.c)

/assar

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5l8zhk25v9.fsf>