Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Nov 1999 17:40:17 -0500 (EST)
From:      spork <spork@super-g.com>
To:        Udo Schweigert <ust@cert.siemens.de>
Cc:        Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: ssh-1.2.27 remote buffer overflow - exploitable  (VD#7)
Message-ID:  <Pine.BSF.4.00.9911161739451.13005-100000@super-g.com>
In-Reply-To: <19991116223750.A2271@alaska.cert.siemens.de>

next in thread | previous in thread | raw e-mail | index | archive | help
I'll take it, and I can post it to our anon ftp server if that's any
help...

charles

On Tue, 16 Nov 1999, Udo Schweigert wrote:

> 
> I have it here. Whom should I mail it?
> 
> Regards.
> -------------------------------------------------------------------------------
> Udo Schweigert              || Voice      : +49 89 636 42170
> Siemens AG, Siemens CERT    || Fax        : +49 89 636 41166
> ZT IK 3                     || email      : Udo.Schweigert@mchp.siemens.de
> D-81730 Muenchen / Germany  ||            : ust@cert.siemens.de
> PGP fingerprint             || 2A 53 F6 A6 30 59 64 02  6B C4 E0 73 B2 C9 6C E7
> -------------------------------------------------------------------------------
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.00.9911161739451.13005-100000>