hehe! It's true, this was an old problem, I found that out the hard way
long ago for not upgrading nfs-utils. Does anyone know where these
hackers are getting their files and info from, most sites explain the
problem but not how it was done?
On 19 Jan 2001, Trond Eivind [iso-8859-1] Glomsrød wrote:
> "Michael H. Warfield" <[EMAIL PROTECTED]> writes:
>
> > On Thu, Jan 18, 2001 at 10:56:56PM -0500, tc lewis wrote:
> >
> > > the problem with simply updating to the latest rpms is the switch from
> > > inetd to xinetd and other misc config problems that the rpms will bring
> > > out. granted i can upgrade a handful of packages, and maybe that's the
> >
> > Not true... Jumping revs will do that... Keeping up to date
> > should not. RedHat 6.2 will ALL of the security updates is still on
> > inetd, not xinetd.
> >
> > > safest choice, but i'd still be interested in knowing if
> > > wu-ftpd-2.6.0-2.5.x is vulnerable to the attack or not
>
> No, it isn't. The official fix is in 2.6.1, but we fixed the problem
> before this was released.
>
> > Granted that RedHat's record with regard to security and
> > upgrades like this has been an abysmal embarrasment.
> > But it's still
> > the only shot you've got. As low as it is, you can only do
> > worse by NOT upgrading. That will not change until people start
> > turning from RedHat and turning to more responsible vendors.
>
> We fixed the problem 7 months ago, and issued an errata for it. What's
> your problem?
>
> > Unfortunately, I can't recommend any that are any better. TurboLinux
> > was
>
> You're the first one I've ever heard give Turbo a compliment for
> responsiveness...
>
>
>
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list