Date: Sun, 18 Feb 2001 15:10:05 +0800 From: Ng Pheng Siong <ngps@post1.com> To: Hiroaki Etoh <etoh@trl.ibm.co.jp> Cc: security@FreeBSD.ORG, kris@FreeBSD.ORG, ash@lab.poc.net, kjm@rins.ryukoku.ac.jp, iwamura@muraoka.info.waseda.ac.jp Subject: Re: Base system with gcc stack-smashing protector Message-ID: <20010218151005.B424@madcap.dyndns.org> In-Reply-To: <20010216182625I.etoh@trl.ibm.com>; from etoh@trl.ibm.co.jp on Fri, Feb 16, 2001 at 06:26:25PM %2B0900 References: <20001117154551.A77867@citusc17.usc.edu> <20010216182625I.etoh@trl.ibm.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Feb 16, 2001 at 06:26:25PM +0900, Hiroaki Etoh wrote: > We confirmed the protected system blocked the bind TSIG exploit which is > announced from CERT, 31 Jan, 2001. Hmmm, is an exploit in the wild? Are servers being probed actively? I've been hearing people say no exploit has turned up yet. Thanks. -- Ng Pheng Siong <ngps@post1.com> * http://www.post1.com/home/ngps To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010218151005.B424>