Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 6 Apr 2001 18:01:59 -0500
From:      "Steven Petmecky" <petmecky@support.accessus.net>
To:        <freebsd-questions@freebsd.org>
Subject:   NTPD 4.0.99k Patch?
Message-ID:  <007701c0beed$96096aa0$1eabcecf@accessus.net>

index | next in thread | raw e-mail

[-- Attachment #1 --]
Does anyone have a fully patched tarball of the ntpd 4.0.99k FreeBSD port, that fixes the remote buffer overflow exploit? I've got timeservers I really need to put back into service.




[-- Attachment #2 --]
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 5.50.4611.1300" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Does anyone have a fully patched tarball of the 
ntpd 4.0.99k FreeBSD port, that fixes the remote buffer overflow exploit? I've 
got timeservers I really need to put back into service.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV></BODY></HTML>
home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?007701c0beed$96096aa0$1eabcecf>