Date: Wed, 03 Oct 2007 19:49:31 -0400 From: Mike Tancsa <mike@sentex.net> To: Stefan Esser <se@freebsd.org>, freebsd-security@freebsd.org Subject: Re: OpenSSL bufffer overflow Message-ID: <200710032349.l93Nn8Co011720@lava.sentex.ca> In-Reply-To: <46FD7595.8090506@FreeBSD.org> References: <46FD7595.8090506@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
At 05:43 PM 9/28/2007, Stefan Esser wrote: >I did not see any commits to the OpenSSL code, recently; is anybody >going to commit the fix? > >See http://www.securityfocus.com/archive/1/480855/30/0 for details ... How serious is this particular issue ? Is it easily exploitable, or difficult to do ? Are some apps more at risk of exploitation than others ? e.g. ssh,apache ? ---Mike >Regards, STefan >_______________________________________________ >freebsd-security@freebsd.org mailing list >http://lists.freebsd.org/mailman/listinfo/freebsd-security >To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200710032349.l93Nn8Co011720>