Date: Sat, 21 Jul 2001 14:53:55 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Holtor <holtor@yahoo.com> Cc: Kris Kennaway <kris@obsecurity.org>, security@freebsd.org Subject: Re: telnetd root exploit Message-ID: <20010721145355.A4238@xor.obsecurity.org> In-Reply-To: <20010721215005.70250.qmail@web11606.mail.yahoo.com>; from holtor@yahoo.com on Sat, Jul 21, 2001 at 02:50:05PM -0700 References: <20010721144337.B90359@xor.obsecurity.org> <20010721215005.70250.qmail@web11606.mail.yahoo.com>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Sat, Jul 21, 2001 at 02:50:05PM -0700, Holtor wrote: > --- Kris Kennaway <kris@obsecurity.org> wrote: > > On Sun, Jul 22, 2001 at 01:29:44AM +0400, Dmitry > > Valdov wrote: > > > Hi! > > > > > > How about 3.x and 2.x? > > > > 3.x has not been patched yet, but will be. 2.x may > > or may not be > > patched (that branch is not supported) -- it's up to > > a committer to do > > it if they want to. > > > > Kris > > > > > ATTACHMENT part 2 application/pgp-signature > > > Kris, > > Any idea when the official advisory will be sent? > I don't want to think i'm patched and restart telnetd > only to be rooted by some lame script kiddie. Thanks > much. Probably Monday. Kris [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7WfnyWry0BWjoQKURAvHBAJ9VozeYaA97l386WSsGVPFzFvhY3ACfczBk VoKezlsGhhQCO2wBX2FOqYQ= =94AV -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010721145355.A4238>
