Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 03 Oct 2007 19:49:31 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        Stefan Esser <se@freebsd.org>, freebsd-security@freebsd.org
Subject:   Re: OpenSSL bufffer overflow
Message-ID:  <200710032349.l93Nn8Co011720@lava.sentex.ca>
In-Reply-To: <46FD7595.8090506@FreeBSD.org>
References:  <46FD7595.8090506@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
At 05:43 PM 9/28/2007, Stefan Esser wrote:
>I did not see any commits to the OpenSSL code, recently; is anybody
>going to commit the fix?
>
>See http://www.securityfocus.com/archive/1/480855/30/0 for details ...

How serious is this particular issue ? Is it easily exploitable, or 
difficult to do ?  Are some apps more at risk of exploitation than 
others ? e.g. ssh,apache ?

         ---Mike


>Regards, STefan
>_______________________________________________
>freebsd-security@freebsd.org mailing list
>http://lists.freebsd.org/mailman/listinfo/freebsd-security
>To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200710032349.l93Nn8Co011720>