From owner-freebsd-security Tue Mar 12 15:37:27 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id PAA01786 for security-outgoing; Tue, 12 Mar 1996 15:37:27 -0800 (PST) Received: from nervosa.com (root@nervosa.com [192.187.228.86]) by freefall.freebsd.org (8.7.3/8.7.3) with ESMTP id PAA01781 for ; Tue, 12 Mar 1996 15:37:24 -0800 (PST) Received: from nervosa.com (coredump@onyx.nervosa.com [10.0.0.1]) by nervosa.com (8.7.5/nervosa.com.2) with SMTP id PAA10257; Tue, 12 Mar 1996 15:37:04 -0800 (PST) Date: Tue, 12 Mar 1996 15:37:03 -0800 (PST) From: invalid opcode To: Thomas J Balfe cc: freebsd-security@FreeBSD.org Subject: Re: CA-95:14 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.org X-Loop: FreeBSD.org Precedence: bulk On Tue, 12 Mar 1996, Thomas J Balfe wrote: > Does 2.1R have the RFC 1408 or RFC 1572 telnetd_environment_vulnerability > bug worked out of it, or do I have to apply a patch? Are there any other > things that I should apply to 2.1R? Thanks. > Thomas J Balfe As far as I can tell (strings /usr/bin/telnet | grep -i LD), it doesn't appear to be present. == Chris Layne ============================================================= == coredump@nervosa.com ================ http://www.nervosa.com/~coredump ==