Date: Mon, 27 Aug 2001 14:58:41 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Kevin Lyons <klyons@corserv.corserv.com> Cc: issei@jp.freebsd.org, freebsd-chat@FreeBSD.ORG Subject: Re: ssltelnetd 0.13 Message-ID: <20010827145841.B46435@xor.obsecurity.org> In-Reply-To: <200108252330.SAA04436@corserv.corserv.com>; from klyons@corserv.corserv.com on Sat, Aug 25, 2001 at 06:30:15PM -0500 References: <200108252330.SAA04436@corserv.corserv.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--BwCQnh7xodEAoBMC Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Aug 25, 2001 at 06:30:15PM -0500, Kevin Lyons wrote: > I am looking for a replacement telnetd and saw ssltelnetd in the ports > collection, but also see a tag FORBIDDEN remote exploit not fixed. >=20 > Please advise if this package/port has had the exploit fixed. If not > do you know of any other telnet daemon that I can run. I don't > want to upgrade my whole release just to fix telnetd and the patches > for the exploit don't build on my 2.x.x fbsd release. That's correct. The telnetd in the kerberos ports is fixed, but it installs a lot of other baggage along with it. Kris --BwCQnh7xodEAoBMC Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7isKRWry0BWjoQKURAkFKAKDJaaKrA1J47QZlcFO/KoBsJWv5SwCg63Ok JNVU4yR4XT6D+CBC6B67ezI= =Ug/O -----END PGP SIGNATURE----- --BwCQnh7xodEAoBMC-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-chat" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010827145841.B46435>