Date: Thu, 12 Jul 2001 13:12:21 -0700 From: Kris Kennaway <kris@obsecurity.org> To: alexus <ml@db.nexgen.com> Cc: Gabriel Rocha <grocha@geeksimplex.org>, Mike Tancsa <mike@sentex.net>, security@FreeBSD.ORG Subject: Re: FreeBSD 4.3 local root Message-ID: <20010712131221.A10885@xor.obsecurity.org> In-Reply-To: <001801c10b0e$1976d370$97625c42@alexus>; from ml@db.nexgen.com on Thu, Jul 12, 2001 at 04:06:12PM -0400 References: <001f01c10af7$9b42f120$97625c42@alexus> <5.1.0.14.0.20010712132715.035c48a0@marble.sentex.ca> <001801c10b0e$1976d370$97625c42@alexus>
next in thread | previous in thread | raw e-mail | index | archive | help
--Q68bSM7Ycu6FN28Q Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Thu, Jul 12, 2001 at 04:06:12PM -0400, alexus wrote: > doesn't work for me on 4.2R Guys, you might as well just stop frobbing with the exploit and install the patch. The vulnerability is real, even if you can't get this instance of the exploit to work. Kris --Q68bSM7Ycu6FN28Q Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7TgSkWry0BWjoQKURAnFUAKDjaUad0/YHC64SR7zeyrClndcNUACeNlCp ajc2RzwZ9K/IQxw9NNElrA0= =QaM+ -----END PGP SIGNATURE----- --Q68bSM7Ycu6FN28Q-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010712131221.A10885>