Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 04 May 1999 14:52:12 -0600
From:      Warner Losh <imp@harmony.village.org>
To:        Brett Glass <brett@lariat.org>
Cc:        "David G. Andersen" <danderse@cs.utah.edu>, security@FreeBSD.ORG
Subject:   Re: Claimed remote reboot exploit: Real or bogus? 
Message-ID:  <199905042052.OAA04643@harmony.village.org>
In-Reply-To: Your message of "Mon, 03 May 1999 17:29:20 MDT." <4.2.0.37.19990503172000.04f63ee0@localhost> 
References:  <4.2.0.37.19990503172000.04f63ee0@localhost>  <Brett Glass's message of Mon, May 3 1999 <4.2.0.37.19990503171021.04dd6630@localhost> <4.2.0.37.19990503171021.04dd6630@localhost> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <4.2.0.37.19990503172000.04f63ee0@localhost> Brett Glass writes:
: Still, the release of 3.2-R is nigh, and we DO want to install that
: one. So, we'd like to see the exploit identified and squashed before 
: 3.2-R goes out the door.

I'm real keen on that as well.  If anybody gets a copy of an exploit,
please forward it to the security officer with explicit instructions
on how to run it.  I've had a few exploits come accross recently that
have said they were bad, but weren't trivial to run.

Warner


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199905042052.OAA04643>