From owner-freebsd-security Tue Apr 30 08:39:28 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id IAA15766 for security-outgoing; Tue, 30 Apr 1996 08:39:28 -0700 (PDT) Received: from precipice.shockwave.com (precipice.shockwave.com [171.69.108.33]) by freefall.freebsd.org (8.7.3/8.7.3) with ESMTP id IAA15759 for ; Tue, 30 Apr 1996 08:39:24 -0700 (PDT) Received: from shockwave.com (localhost.shockwave.com [127.0.0.1]) by precipice.shockwave.com (8.7.5/8.7.3) with ESMTP id IAA00587; Tue, 30 Apr 1996 08:38:50 -0700 (PDT) Message-Id: <199604301538.IAA00587@precipice.shockwave.com> X-Mailer: exmh version 1.6.6 3/24/96 To: cschuber@orca.gov.bc.ca Cc: freebsd-security@FreeBSD.ORG Subject: Re: CERT Advisory CA-96.09 - Vulnerability in rpc.statd In-Reply-To: Your message of "Sun, 28 Apr 1996 18:06:34 PDT." <199604290106.SAA19131@passer.osg.gov.bc.ca> Mime-Version: 1.0 Content-Type: application/pgp; format=mime; x-action=signclear; x-originator=73D288A5 Content-Transfer-Encoding: 7bit Date: Tue, 30 Apr 1996 08:38:49 -0700 From: Paul Traina Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk -----BEGIN PGP SIGNED MESSAGE----- Content-Type: text/plain; charset=us-ascii Our statd is not vulnerable. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMYY0B1UuHi5z0oilAQFvlQP/dQe6/ejidbhEd7K/Mo4c3WM0P9GVOUW4 OVB/wbCg37YmkI6q0ohR3qGat2ILv5CvoOQAALA4OXp/hKZ/TZopesTdLlpdsMMm o+m/ZsAujE2IaWKyEFni5F0u6iofPzZBboqYtSCmQG/lFeNqSvBDPcfcMPLLIZNH ya/GcDOh3ro= =E+Sm -----END PGP SIGNATURE-----