Date: Fri, 23 Dec 2011 11:08:05 -0600 (CST) From: Tim Zingelman <zingelman@fnal.gov> To: security-officer@freebsd.org Cc: freebsd-security@freebsd.org Subject: Re: Merry Christmas from the FreeBSD Security Team Message-ID: <Pine.SOL.4.64.1112231103280.23931@nova.fnal.gov> In-Reply-To: <4EF4A120.1000305@freebsd.org> References: <4EF4A120.1000305@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 23 Dec 2011, FreeBSD Security Officer wrote: > Unfortunately my hand was forced: One of the issues (FreeBSD-SA-11:08.telnetd) > is a remote root vulnerability which is being actively exploited in the wild; > bugs really don't come any worse than this. On the positive side, most people > have moved past telnet and on to SSH by now; but this is still not an issue we > could postpone until a more convenient time. Is there any reason this does would not apply to telnetd from most other vendors? In particular MIT Kerberos & heimdal? Thanks, - Tim
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SOL.4.64.1112231103280.23931>