Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 31 Jul 2003 15:52:54 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        Lucas Holt <luke@foolishgames.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: WU FTPD
Message-ID:  <20030731225254.GB15353@rot13.obsecurity.org>
In-Reply-To: <6041B5F2-C383-11D7-A62F-0030656DD690@foolishgames.com>
References:  <6041B5F2-C383-11D7-A62F-0030656DD690@foolishgames.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--gj572EiMnwbLXET9
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Thu, Jul 31, 2003 at 02:18:25PM -0400, Lucas Holt wrote:
> There was a vulnerability released today in wu ftpd and I'm unclear if=20
> this would affect the software running on a freebsd system.  It appears=
=20
> to cause problems on linux 2.4.x kernels but not older kernels due to=20
> the way the compiler works.  Does anyone know if this problem is=20
> exploitable on freebsd?  If not, where should I ask this question?

Read security@ or just update your ports collection and recompile wuftpd.

Kris

--gj572EiMnwbLXET9
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (FreeBSD)

iD8DBQE/KZ3GWry0BWjoQKURAjL1AJ4oCgGL+xxCKGMmffB740mqWRJLdACg/RPv
7oZHQvUwf8tjVoCU9DInmmo=
=KAoO
-----END PGP SIGNATURE-----

--gj572EiMnwbLXET9--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030731225254.GB15353>