From owner-freebsd-stable Mon May 3 16:40:59 1999 Delivered-To: freebsd-stable@freebsd.org Received: from paprika.michvhf.com (paprika.michvhf.com [209.57.60.12]) by hub.freebsd.org (Postfix) with SMTP id 0690014CCA for ; Mon, 3 May 1999 16:40:55 -0700 (PDT) (envelope-from vev@michvhf.com) Received: (qmail 11372 invoked by uid 1001); 3 May 1999 23:40:59 -0000 Message-ID: X-Mailer: XFMail 1.3 [p0] on FreeBSD X-Priority: 3 (Normal) Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 8bit MIME-Version: 1.0 In-Reply-To: Date: Mon, 03 May 1999 19:40:59 -0400 (EDT) X-Face: *0^4Iw) To: Seth Subject: RE: FreeBSD 3.1 remote reboot exploit (fwd) Cc: freebsd-stable@freebsd.org, security@freebsd.org Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On 03-May-99 Seth wrote: > Just hit bugtraq, figured people might want to get in touch or start > digging. It's typically in bad taste to post it to BugTraq before contacting the vendor. Vince. -- ========================================================================== Vince Vielhaber -- KA8CSH email: vev@michvhf.com flame-mail: /dev/null # include TEAM-OS2 Online Campground Directory http://www.camping-usa.com Online Giftshop Superstore http://www.cloudninegifts.com ========================================================================== To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message