Date: Thu, 14 Dec 2000 20:57:49 -0500 From: Chris Faulhaber <jedgar@fxp.org> To: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca> Cc: desmo@bandwidth.org, freebsd-security@freebsd.org Subject: Re: LPRng remote root exploit (fwd) Message-ID: <20001214205749.A48180@peitho.fxp.org> In-Reply-To: <200012150131.eBF1VPa05764@cwsys.cwsent.com>; from Cy.Schubert@uumail.gov.bc.ca on Thu, Dec 14, 2000 at 05:30:52PM -0800 References: <200012150131.eBF1VPa05764@cwsys.cwsent.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Dec 14, 2000 at 05:30:52PM -0800, Cy Schubert - ITSD Open Systems Group wrote: > This is just a heads up. > > Anyone care to test this with our LPRng port? > *snip* > > LPRng-3.6.22/23/24 remote root exploit, enjoy. > *snip* It won't hurt to try, however, ports/sysutils/LPRng is at 3.6.26, which is supposed to fix this problem. -- Chris D. Faulhaber - jedgar@fxp.org - jedgar@FreeBSD.org -------------------------------------------------------- FreeBSD: The Power To Serve - http://www.FreeBSD.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001214205749.A48180>