From owner-freebsd-security Fri Oct 6 5:10:55 2000 Delivered-To: freebsd-security@freebsd.org Received: from ns1.via-net-works.net.ar (ns1.via-net-works.net.ar [200.10.100.10]) by hub.freebsd.org (Postfix) with ESMTP id DB9E737B66C for ; Fri, 6 Oct 2000 05:10:49 -0700 (PDT) Received: (from fpscha@localhost) by ns1.via-net-works.net.ar (8.9.3/8.9.3) id JAA83234 for security@freebsd.org; Fri, 6 Oct 2000 09:12:54 -0300 (ART) From: Fernando Schapachnik Message-Id: <200010061212.JAA83234@ns1.via-net-works.net.ar> Subject: HERT advisory: FreeBSD IP Spoofing (fwd) To: security@freebsd.org Date: Fri, 6 Oct 2000 09:12:54 -0300 (ART) Reply-To: Fernando Schapachnik X-Mailer: ELM [version 2.4ME+ PL82 (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=ISO-8859-1 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Many of you may have read this. It states that 4.1 is vulnerable, but doesn't mention 4.1.1. It also provides URL to patches that are not accesible. Somebody has more info? TIA! ----- Forwarded message from Pascal Bouchareine -----