Date: Thu, 19 Jul 2001 20:14:07 +0300 From: Ruslan Ermilov <ru@FreeBSD.ORG> To: Przemyslaw Frasunek <venglin@freebsd.lublin.pl> Cc: security@FreeBSD.ORG Subject: [PATCH] Re: FreeBSD remote root exploit ? Message-ID: <20010719201407.B61061@sunbay.com> In-Reply-To: <014d01c11031$bdab5a10$2001a8c0@clitoris>; from venglin@freebsd.lublin.pl on Thu, Jul 19, 2001 at 11:03:53AM %2B0200 References: <5.1.0.14.0.20010719001357.03e22638@192.168.0.12> <014d01c11031$bdab5a10$2001a8c0@clitoris>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 19, 2001 at 11:03:53AM +0200, Przemyslaw Frasunek wrote: > > Posted to bugtraq is a notice about telnetd being remotely root > > exploitable. Does anyone know if it is true ? > > Yes, telnetd is vulnerable. > The patch is available at: http://people.FreeBSD.org/~ru/telnetd.patch Cheers, -- Ruslan Ermilov Oracle Developer/DBA, ru@sunbay.com Sunbay Software AG, ru@FreeBSD.org FreeBSD committer, +380.652.512.251 Simferopol, Ukraine http://www.FreeBSD.org The Power To Serve http://www.oracle.com Enabling The Information Age To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010719201407.B61061>