Date: Wed, 8 Sep 1999 02:49:56 -0700 (PDT) From: stuart@eclipse.net.uk To: freebsd-gnats-submit@freebsd.org Subject: ports/13636: beroftpd also affected by proftpd/wuftpd exploit Message-ID: <19990908094956.37A8815032@hub.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 13636 >Category: ports >Synopsis: beroftpd also affected by proftpd/wuftpd exploit >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Sep 8 02:50:01 PDT 1999 >Closed-Date: >Last-Modified: >Originator: Stuart Henderson >Release: 3.2-release >Organization: Eclipse Networking Ltd >Environment: FreeBSD ##.eclipse.net.uk 3.2-RELEASE FreeBSD 3.2-RELEASE #0: Wed Jun 23 13:02:20 BST 1999 ##@##.eclipse.net.uk:/usr/src/sys/compile/## i386 >Description: beroftpd is also based on wu-ftpd and affected by the same buffer overflow as proftpd and wu. >How-To-Repeat: >Fix: Apply the same patch as for wu-ftpd. >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990908094956.37A8815032>