Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 23 Dec 2011 11:08:05 -0600 (CST)
From:      Tim Zingelman <zingelman@fnal.gov>
To:        security-officer@freebsd.org
Cc:        freebsd-security@freebsd.org
Subject:   Re: Merry Christmas from the FreeBSD Security Team
Message-ID:  <Pine.SOL.4.64.1112231103280.23931@nova.fnal.gov>
In-Reply-To: <4EF4A120.1000305@freebsd.org>
References:  <4EF4A120.1000305@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 23 Dec 2011, FreeBSD Security Officer wrote:

> Unfortunately my hand was forced: One of the issues (FreeBSD-SA-11:08.telnetd)
> is a remote root vulnerability which is being actively exploited in the wild;
> bugs really don't come any worse than this.  On the positive side, most people
> have moved past telnet and on to SSH by now; but this is still not an issue we
> could postpone until a more convenient time.

Is there any reason this does would not apply to telnetd from most other 
vendors?  In particular MIT Kerberos & heimdal?

Thanks,

  - Tim



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SOL.4.64.1112231103280.23931>