From owner-freebsd-security@FreeBSD.ORG Tue Jul 21 18:22:36 2009 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 343DF106566C for ; Tue, 21 Jul 2009 18:22:36 +0000 (UTC) (envelope-from jmiller@securityfocus.com) Received: from outgoing2.securityfocus.com (outgoing.securityfocus.com [205.206.231.26]) by mx1.freebsd.org (Postfix) with ESMTP id 15D9A8FC08 for ; Tue, 21 Jul 2009 18:22:36 +0000 (UTC) (envelope-from jmiller@securityfocus.com) Received: from mail.securityfocus.com (mail.securityfocus.com [205.206.231.9]) by outgoing2.securityfocus.com (Postfix) with SMTP id CD1861437E4 for ; Tue, 21 Jul 2009 12:03:37 -0600 (MDT) Received: (qmail 14913 invoked by uid 533); 21 Jul 2009 18:04:13 -0000 Date: Tue, 21 Jul 2009 12:04:13 -0600 From: "Jason V. Miller" To: Dag-Erling Sm??rgrav Message-ID: <20090721180413.GA13170@mail.securityfocus.com> References: <6101e8c40907201008n62eeec05r6670a79698bc2ac7@mail.gmail.com> <86zlayvydu.fsf@ds4.des.no> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Description: Message Content-Disposition: inline In-Reply-To: <86zlayvydu.fsf@ds4.des.no> User-Agent: Mutt/1.4.1i Cc: freebsd-security@freebsd.org, FreeBSD Security Officer , Oliver Pinter Subject: Re: 2009-07-20 FreeBSD 7.2 (pecoff executable) Local Denial of Service Exploit 23 R D Shaun Colley X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Jul 2009 18:22:36 -0000 On Tue, Jul 21, 2009 at 05:39:25PM +0200, Dag-Erling Sm??rgrav wrote: > Oliver Pinter writes: > > http://milw0rm.com/exploits/9206 > > Standard procedure is to contact so@freebsd.org directly rather than > post an exploit on a public, archived mailing list. To be fair, he didn't post a new exploit to the list, but instead a link to an already-public exploit. J. -- Jason V. Miller