From owner-freebsd-security Mon Jan 29 12:10:10 2001 Delivered-To: freebsd-security@freebsd.org Received: from flood.ping.uio.no (flood.ping.uio.no [129.240.78.31]) by hub.freebsd.org (Postfix) with ESMTP id D802737B402 for ; Mon, 29 Jan 2001 12:09:50 -0800 (PST) Received: (from des@localhost) by flood.ping.uio.no (8.9.3/8.9.3) id VAA12740; Mon, 29 Jan 2001 21:09:00 +0100 (CET) (envelope-from des@ofug.org) X-URL: http://www.ofug.org/~des/ X-Disclaimer: The views expressed in this message do not necessarily coincide with those of any organisation or company with which I am or have been affiliated. To: Buliwyf McGraw Cc: freebsd-security@FreeBSD.ORG Subject: Re: ecepass - proof of concept code for FreeBSD ipfw bypass (fwd) References: From: Dag-Erling Smorgrav Date: 29 Jan 2001 21:08:59 +0100 In-Reply-To: Buliwyf McGraw's message of "Mon, 29 Jan 2001 11:18:44 -0500 (COT)" Message-ID: Lines: 9 User-Agent: Gnus/5.0802 (Gnus v5.8.2) Emacs/20.4 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Buliwyf McGraw writes: > Very interesting... but not really novel, this vulnerability has been known (and patched) for some time now. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message