Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Jul 2001 13:12:21 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        alexus <ml@db.nexgen.com>
Cc:        Gabriel Rocha <grocha@geeksimplex.org>, Mike Tancsa <mike@sentex.net>, security@FreeBSD.ORG
Subject:   Re: FreeBSD 4.3 local root
Message-ID:  <20010712131221.A10885@xor.obsecurity.org>
In-Reply-To: <001801c10b0e$1976d370$97625c42@alexus>; from ml@db.nexgen.com on Thu, Jul 12, 2001 at 04:06:12PM -0400
References:  <001f01c10af7$9b42f120$97625c42@alexus> <5.1.0.14.0.20010712132715.035c48a0@marble.sentex.ca> <001801c10b0e$1976d370$97625c42@alexus>

index | next in thread | previous in thread | raw e-mail

[-- Attachment #1 --]
On Thu, Jul 12, 2001 at 04:06:12PM -0400, alexus wrote:
> doesn't work for me on 4.2R

Guys, you might as well just stop frobbing with the exploit and
install the patch.  The vulnerability is real, even if you can't get
this instance of the exploit to work.

Kris

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE7TgSkWry0BWjoQKURAnFUAKDjaUad0/YHC64SR7zeyrClndcNUACeNlCp
ajc2RzwZ9K/IQxw9NNElrA0=
=QaM+
-----END PGP SIGNATURE-----
help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010712131221.A10885>