Date: Thu, 12 Jul 2001 13:12:21 -0700 From: Kris Kennaway <kris@obsecurity.org> To: alexus <ml@db.nexgen.com> Cc: Gabriel Rocha <grocha@geeksimplex.org>, Mike Tancsa <mike@sentex.net>, security@FreeBSD.ORG Subject: Re: FreeBSD 4.3 local root Message-ID: <20010712131221.A10885@xor.obsecurity.org> In-Reply-To: <001801c10b0e$1976d370$97625c42@alexus>; from ml@db.nexgen.com on Thu, Jul 12, 2001 at 04:06:12PM -0400 References: <001f01c10af7$9b42f120$97625c42@alexus> <5.1.0.14.0.20010712132715.035c48a0@marble.sentex.ca> <001801c10b0e$1976d370$97625c42@alexus>
index | next in thread | previous in thread | raw e-mail
[-- Attachment #1 --] On Thu, Jul 12, 2001 at 04:06:12PM -0400, alexus wrote: > doesn't work for me on 4.2R Guys, you might as well just stop frobbing with the exploit and install the patch. The vulnerability is real, even if you can't get this instance of the exploit to work. Kris [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7TgSkWry0BWjoQKURAnFUAKDjaUad0/YHC64SR7zeyrClndcNUACeNlCp ajc2RzwZ9K/IQxw9NNElrA0= =QaM+ -----END PGP SIGNATURE-----help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010712131221.A10885>
