From owner-freebsd-security Tue Oct 13 14:40:12 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA02113 for freebsd-security-outgoing; Tue, 13 Oct 1998 14:40:12 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from super-g.inch.com (super-g.com [207.240.140.161]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA02016 for ; Tue, 13 Oct 1998 14:40:01 -0700 (PDT) (envelope-from spork@super-g.com) Received: from localhost (localhost [127.0.0.1]) by super-g.inch.com (8.8.8/8.8.5) with SMTP id RAA15620 for ; Tue, 13 Oct 1998 17:39:36 -0400 (EDT) Date: Tue, 13 Oct 1998 17:39:36 -0400 (EDT) From: spork X-Sender: spork@super-g.inch.com To: freebsd-security@FreeBSD.ORG Subject: mountd exploit Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hi, I saw in the annoucement posted to Bugtraq that FreeBSD post 2.2.6(?) was immune. Does anyone have data on whether earlier versions, especially 2.1.7.1, are vulnerable? Thanks, Charles --- Charles Sprickman spork@super-g.com --- "...there's no idea that's so good you can't ruin it with a few well-placed idiots." To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message