Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jan 2000 15:37:24 -0500
From:      Mike Tancsa <mike@sentex.net>
To:        Tom <tom@uniserve.com>
Cc:        freebsd-security@freebsd.org, freebsd-stable@freebsd.org, security-officer@freebsd.org
Subject:   Re: bugtraq posts:  stream.c - new FreeBSD exploit?
Message-ID:  <3.0.5.32.20000120153724.0206a850@staff.sentex.ca>
In-Reply-To: <Pine.BSF.4.02A.10001201232520.26367-100000@shell.uniserve. ca>
References:  <3.0.5.32.20000120152818.01d7fa40@staff.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
At 12:34 PM 1/20/00 -0800, Tom wrote:
>  Uhh.. there isn't enough information here to determine anything.

That was only a snippet. The poster claims to have contacted the freebsd
team and that they were working on it... I just wanted to know if this were
the case.


Another snippet of the post below.  I didnt want to blurt the whole bugtraq
posting, as I suspect most people are already subscribed to it.

>One thing of note:  he also stated this happened on non-freebsd systems,
>which is contrary to what the other person said, who was "under the
>impression it was freebsd specific."
>
>I have the source, which I'm not going to post for 2-3 days (give time for
>fbsd to work on the fix).  If it isn't out before the 21st, I'll post it up.
>
>

	---Mike
------------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Network Administrator,     			  mike@sentex.net
Sentex Communications                 		  www.sentex.net
Cambridge, Ontario Canada


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.5.32.20000120153724.0206a850>