Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 Jul 2001 20:14:07 +0300
From:      Ruslan Ermilov <ru@FreeBSD.ORG>
To:        Przemyslaw Frasunek <venglin@freebsd.lublin.pl>
Cc:        security@FreeBSD.ORG
Subject:   [PATCH] Re: FreeBSD remote root exploit ?
Message-ID:  <20010719201407.B61061@sunbay.com>
In-Reply-To: <014d01c11031$bdab5a10$2001a8c0@clitoris>; from venglin@freebsd.lublin.pl on Thu, Jul 19, 2001 at 11:03:53AM %2B0200
References:  <5.1.0.14.0.20010719001357.03e22638@192.168.0.12> <014d01c11031$bdab5a10$2001a8c0@clitoris>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 19, 2001 at 11:03:53AM +0200, Przemyslaw Frasunek wrote:
> > Posted to bugtraq is a notice about telnetd being remotely root
> > exploitable. Does anyone know if it is true ?
> 
> Yes, telnetd is vulnerable.
> 
The patch is available at:

http://people.FreeBSD.org/~ru/telnetd.patch


Cheers,
-- 
Ruslan Ermilov		Oracle Developer/DBA,
ru@sunbay.com		Sunbay Software AG,
ru@FreeBSD.org		FreeBSD committer,
+380.652.512.251	Simferopol, Ukraine

http://www.FreeBSD.org	The Power To Serve
http://www.oracle.com	Enabling The Information Age

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010719201407.B61061>