Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Jun 2000 06:40:04 -0700 (PDT)
From:      Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
To:        freebsd-ports@FreeBSD.org
Subject:   Re: ports/19503: isc-dhcp3 port root exploit 
Message-ID:  <200006261340.GAA91530@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/19503; it has been noted by GNATS.

From: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
To: Will Andrews <andrews@technologist.com>
Cc: Cy.Schubert@uumail.gov.bc.ca, FreeBSD-gnats-submit@FreeBSD.ORG
Subject: Re: ports/19503: isc-dhcp3 port root exploit 
Date: Mon, 26 Jun 2000 06:32:55 -0700

 In message <20000625150950.A85886@argon.gryphonsoft.com>, Will Andrews 
 writes:
 > On Sun, Jun 25, 2000 at 08:20:26AM -0700, Cy.Schubert@uumail.gov.bc.ca wrote:
 > > >Synopsis:       isc-dhcp3 root exploit
 > 
 > isc-dhcp3 is not vulnerable, according to your quote.  However,
 > isc-dhcp2 IS vulnerable and needs to be updated.
 
 The advisory makes the statement, "this exploit is present in all 
 versions of the ISC DHCP client prior to 2.0pl1 and 3.0b1pl14".  
 Because of this statement, the version 2 port needs to be updated to 
 2.0pl1 and the version 3 port needs to be updated to 3.0b1pl14.
 
 
 Regards,                       Phone:  (250)387-8437
 Cy Schubert                      Fax:  (250)387-5766
 Team Leader, Sun/DEC Team   Internet:  Cy.Schubert@osg.gov.bc.ca
 Open Systems Group, ITSD, ISTA
 Province of BC
 
 
 
 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006261340.GAA91530>