Date: Thu, 19 Jul 2001 13:28:00 -0400 From: Pierre-Luc =?iso-8859-1?Q?Lesp=E9rance?= <silence@oksala.org> To: security@FreeBSD.ORG Subject: Re: [PATCH] Re: FreeBSD remote root exploit ? Message-ID: <3B5718A0.2B650C9C@oksala.org> References: <5.1.0.14.0.20010719001357.03e22638@192.168.0.12> <014d01c11031$bdab5a10$2001a8c0@clitoris> <20010719201407.B61061@sunbay.com> <003701c11077$b3125400$0d00a8c0@alexus>
next in thread | previous in thread | raw e-mail | index | archive | help
alexus wrote: > > could you also include some sort of instruction how to apply it? > > thanks in advance > > ----- Original Message ----- > From: "Ruslan Ermilov" <ru@FreeBSD.ORG> > To: "Przemyslaw Frasunek" <venglin@freebsd.lublin.pl> > Cc: <security@FreeBSD.ORG> > Sent: Thursday, July 19, 2001 1:14 PM > Subject: [PATCH] Re: FreeBSD remote root exploit ? > > > On Thu, Jul 19, 2001 at 11:03:53AM +0200, Przemyslaw Frasunek wrote: > > > > Posted to bugtraq is a notice about telnetd being remotely root > > > > exploitable. Does anyone know if it is true ? > > > > > > Yes, telnetd is vulnerable. > > > > > The patch is available at: > > > > http://people.FreeBSD.org/~ru/telnetd.patch > > > > > > Cheers, > > -- > > Ruslan Ermilov Oracle Developer/DBA, > > ru@sunbay.com Sunbay Software AG, > > ru@FreeBSD.org FreeBSD committer, > > +380.652.512.251 Simferopol, Ukraine > > > > http://www.FreeBSD.org The Power To Serve > > http://www.oracle.com Enabling The Information Age > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > > with "unsubscribe freebsd-security" in the body of the message > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message go to /usr/src/crypto/telnet/telnetd and type shell~# patch -p < /where/is/the/file.patch To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3B5718A0.2B650C9C>