Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 12 Jan 2001 18:45:29 -0800
From:      Kris Kennaway <kris@FreeBSD.ORG>
To:        Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: [!H] Tcpdump 3.5.2 remote root vulnerability (fwd)
Message-ID:  <20010112184529.B25168@citusc.usc.edu>
In-Reply-To: <200101122058.f0CKw7I11863@cwsys.cwsent.com>; from Cy.Schubert@uumail.gov.bc.ca on Fri, Jan 12, 2001 at 12:57:57PM -0800
References:  <200101122058.f0CKw7I11863@cwsys.cwsent.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--dc+cDN39EJAMEtIO
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Fri, Jan 12, 2001 at 12:57:57PM -0800, Cy Schubert - ITSD Open Systems Group wrote:
> This affects our tcpdump.

Well..it affects old versions of tcpdump before we patched the
vulnerability (which I discovered and which we initially publicized,
BTW), and released the advisory describing it. All this post is is a
canned exploit for the known, long fixed problem..nothing to worry
about unless you don't act on the security advisories which are
released.

Kris

--dc+cDN39EJAMEtIO
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6X8FJWry0BWjoQKURAnfTAKCZFNZsp+g4id/ruNL4iG0+/WJEswCbBgPe
nSOV1oAcvGM1RTaCuhOWWbM=
=c3Qx
-----END PGP SIGNATURE-----

--dc+cDN39EJAMEtIO--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010112184529.B25168>