From owner-freebsd-security Sat Jan 29 9:13:58 2000 Delivered-To: freebsd-security@freebsd.org Received: from rip.psg.com (rip.psg.com [147.28.0.39]) by hub.freebsd.org (Postfix) with ESMTP id 1205A14E74 for ; Sat, 29 Jan 2000 09:13:56 -0800 (PST) (envelope-from randy@psg.com) Received: from randy by rip.psg.com with local (Exim 3.12 #1) id 12EbRU-00038F-00; Sat, 29 Jan 2000 09:13:48 -0800 From: Randy Bush MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit To: Warner Losh Cc: freebsd-security@freebsd.org Subject: Re: delegate buffer overflow (ports) Message-Id: Date: Sat, 29 Jan 2000 09:13:48 -0800 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > THIS PORT CONTAINS KNOWN SECURITY HOLES WHICH ALLOW A REMOTE ATTACKER > TO EASILY TAKE CONTROL OF YOUR MACHINE might i suggest a taxonomy of vulnerabilities: o vulnerable to remote attack o vulnerable to attack by local user o vulnetable to email or similarly indirect attack in a 'closed' environment, one might not be as worried about the latter two. randy To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message