If memory serves me right, Crist Clark wrote: > Przemyslaw Frasunek wrote: > > > > /* ntpd remote root exploit / babcia padlina ltd. <[EMAIL PROTECTED] > l> */ > > Not good. Not good. Verified the exploit worked on FreeBSD 4.2-STABLE with > the stock 4.0.99b. FreeBSD has a fix in CURRENT already. FreeBSD 4-STABLE got the fix a couple minutes later. Bruce.
- ntpd =< 4.0.99k remote buffer overflow Przemyslaw Frasunek
- Re: ntpd =< 4.0.99k remote buffer... Crist Clark
- Re: ntpd =< 4.0.99k remote bu... Tomasz Grabowski
- Re: ntpd =< 4.0.99k remot... Sebastian Piech
- Re: ntpd =< 4.0.99k remote bu... Matt Collins
- Re: ntpd =< 4.0.99k remot... Alexander Gall
- Re: ntpd =< 4.0.99k r... Casper Dik
- Re: ntpd =< 4.0.99k remot... Fyodor
- Re: ntpd =< 4.0.99k remote bu... Charles Sprickman
- Re: ntpd =< 4.0.99k remote bu... Bruce A. Mah
- Re: ntpd =< 4.0.99k remote buffer... Gary E. Miller
- Re: ntpd =< 4.0.99k remote bu... William D. Colburn (aka Schlake)
- Re: ntpd =< 4.0.99k remote buffer... Charles Sprickman
- Re: ntpd =< 4.0.99k remote bu... Jan Kluka
- Re: ntpd =< 4.0.99k remote bu... Crist Clark
- Re: ntpd =< 4.0.99k remote bu... Athanasius
- Re: ntpd =< 4.0.99k remote buffer... Klaus Steden
- Re: ntpd =< 4.0.99k remote buffer... Stephen Clouse
- Re: ntpd =< 4.0.99k remote bu... Dick St.Peters
- Re: ntpd =< 4.0.99k remote bu... Przemyslaw Frasunek
PGP signature