Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 Jul 2001 13:24:42 -0400
From:      "alexus" <ml@db.nexgen.com>
To:        "Ruslan Ermilov" <ru@FreeBSD.ORG>, "Przemyslaw Frasunek" <venglin@freebsd.lublin.pl>
Cc:        <security@FreeBSD.ORG>
Subject:   Re: [PATCH] Re: FreeBSD remote root exploit ?
Message-ID:  <003701c11077$b3125400$0d00a8c0@alexus>
References:  <5.1.0.14.0.20010719001357.03e22638@192.168.0.12> <014d01c11031$bdab5a10$2001a8c0@clitoris> <20010719201407.B61061@sunbay.com>

next in thread | previous in thread | raw e-mail | index | archive | help
could you also include some sort of instruction how to apply it?

thanks in advance

----- Original Message ----- 
From: "Ruslan Ermilov" <ru@FreeBSD.ORG>
To: "Przemyslaw Frasunek" <venglin@freebsd.lublin.pl>
Cc: <security@FreeBSD.ORG>
Sent: Thursday, July 19, 2001 1:14 PM
Subject: [PATCH] Re: FreeBSD remote root exploit ?


> On Thu, Jul 19, 2001 at 11:03:53AM +0200, Przemyslaw Frasunek wrote:
> > > Posted to bugtraq is a notice about telnetd being remotely root
> > > exploitable. Does anyone know if it is true ?
> > 
> > Yes, telnetd is vulnerable.
> > 
> The patch is available at:
> 
> http://people.FreeBSD.org/~ru/telnetd.patch
> 
> 
> Cheers,
> -- 
> Ruslan Ermilov Oracle Developer/DBA,
> ru@sunbay.com Sunbay Software AG,
> ru@FreeBSD.org FreeBSD committer,
> +380.652.512.251 Simferopol, Ukraine
> 
> http://www.FreeBSD.org The Power To Serve
> http://www.oracle.com Enabling The Information Age
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?003701c11077$b3125400$0d00a8c0>