hehe!  It's true, this was an old problem, I found that out the hard way
long ago for not upgrading nfs-utils.  Does anyone know where these
hackers are getting their files and info from, most sites explain the
problem but not how it was done?


On 19 Jan 2001, Trond Eivind [iso-8859-1] Glomsrød wrote:

> "Michael H. Warfield" <[EMAIL PROTECTED]> writes:
> 
> > On Thu, Jan 18, 2001 at 10:56:56PM -0500, tc lewis wrote:
> > 
> > > the problem with simply updating to the latest rpms is the switch from
> > > inetd to xinetd and other misc config problems that the rpms will bring
> > > out.  granted i can upgrade a handful of packages, and maybe that's the
> > 
> >     Not true...  Jumping revs will do that...  Keeping up to date
> > should not.  RedHat 6.2 will ALL of the security updates is still on
> > inetd, not xinetd.
> > 
> > > safest choice, but i'd still be interested in knowing if
> > > wu-ftpd-2.6.0-2.5.x is vulnerable to the attack or not
> 
> No, it isn't. The official fix is in 2.6.1, but we fixed the problem
> before this was released.
> 
> >     Granted that RedHat's record with regard to security and
> > upgrades like this has been an abysmal embarrasment.  
> > But it's still
> > the only shot you've got.  As low as it is, you can only do
> > worse by NOT upgrading.  That will not change until people start
> > turning from RedHat and turning to more responsible vendors.
> 
> We fixed the problem 7 months ago, and issued an errata for it. What's
> your problem?
> 
> > Unfortunately, I can't recommend any that are any better.  TurboLinux
> > was
> 
> You're the first one I've ever heard give Turbo a compliment for
> responsiveness... 
>  
> 
> 



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to