From owner-freebsd-security Sun Feb 18 7:13:13 2001 Delivered-To: freebsd-security@freebsd.org Received: from madcap.dyndns.org (bb158-53.singnet.com.sg [165.21.158.53]) by hub.freebsd.org (Postfix) with ESMTP id C49AE37B65D; Sun, 18 Feb 2001 07:13:07 -0800 (PST) Received: by madcap.dyndns.org (Postfix, from userid 100) id 771BA1B9; Sun, 18 Feb 2001 15:10:05 +0800 (SGT) Date: Sun, 18 Feb 2001 15:10:05 +0800 From: Ng Pheng Siong To: Hiroaki Etoh Cc: security@FreeBSD.ORG, kris@FreeBSD.ORG, ash@lab.poc.net, kjm@rins.ryukoku.ac.jp, iwamura@muraoka.info.waseda.ac.jp Subject: Re: Base system with gcc stack-smashing protector Message-ID: <20010218151005.B424@madcap.dyndns.org> References: <20001117154551.A77867@citusc17.usc.edu> <20010216182625I.etoh@trl.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0i In-Reply-To: <20010216182625I.etoh@trl.ibm.com>; from etoh@trl.ibm.co.jp on Fri, Feb 16, 2001 at 06:26:25PM +0900 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Fri, Feb 16, 2001 at 06:26:25PM +0900, Hiroaki Etoh wrote: > We confirmed the protected system blocked the bind TSIG exploit which is > announced from CERT, 31 Jan, 2001. Hmmm, is an exploit in the wild? Are servers being probed actively? I've been hearing people say no exploit has turned up yet. Thanks. -- Ng Pheng Siong * http://www.post1.com/home/ngps To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message