Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 18 Feb 2001 15:10:05 +0800
From:      Ng Pheng Siong <ngps@post1.com>
To:        Hiroaki Etoh <etoh@trl.ibm.co.jp>
Cc:        security@FreeBSD.ORG, kris@FreeBSD.ORG, ash@lab.poc.net, kjm@rins.ryukoku.ac.jp, iwamura@muraoka.info.waseda.ac.jp
Subject:   Re: Base system with gcc stack-smashing protector
Message-ID:  <20010218151005.B424@madcap.dyndns.org>
In-Reply-To: <20010216182625I.etoh@trl.ibm.com>; from etoh@trl.ibm.co.jp on Fri, Feb 16, 2001 at 06:26:25PM %2B0900
References:  <20001117154551.A77867@citusc17.usc.edu> <20010216182625I.etoh@trl.ibm.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Feb 16, 2001 at 06:26:25PM +0900, Hiroaki Etoh wrote:
> We confirmed the protected system blocked the bind TSIG exploit which is
> announced from CERT, 31 Jan, 2001.

Hmmm, is an exploit in the wild? Are servers being probed actively?

I've been hearing people say no exploit has turned up yet.

Thanks.
-- 
Ng Pheng Siong <ngps@post1.com> * http://www.post1.com/home/ngps



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010218151005.B424>