Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 14 Dec 2000 20:57:49 -0500
From:      Chris Faulhaber <jedgar@fxp.org>
To:        Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
Cc:        desmo@bandwidth.org, freebsd-security@freebsd.org
Subject:   Re: LPRng remote root exploit (fwd)
Message-ID:  <20001214205749.A48180@peitho.fxp.org>
In-Reply-To: <200012150131.eBF1VPa05764@cwsys.cwsent.com>; from Cy.Schubert@uumail.gov.bc.ca on Thu, Dec 14, 2000 at 05:30:52PM -0800
References:  <200012150131.eBF1VPa05764@cwsys.cwsent.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Dec 14, 2000 at 05:30:52PM -0800, Cy Schubert - ITSD Open Systems Group wrote:
> This is just a heads up.
> 
> Anyone care to test this with our LPRng port?
> 
*snip*
> 
> LPRng-3.6.22/23/24 remote root exploit, enjoy.
> 
*snip*


It won't hurt to try, however, ports/sysutils/LPRng is
at 3.6.26, which is supposed to fix this problem.

-- 
Chris D. Faulhaber - jedgar@fxp.org - jedgar@FreeBSD.org
--------------------------------------------------------
FreeBSD: The Power To Serve   -   http://www.FreeBSD.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001214205749.A48180>