lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040917214441.GA24337@csh.rit.edu>
Date: Fri, 17 Sep 2004 17:44:41 -0400
From: Wesley Shields <wxs@....rit.edu>
To: bugtraq@...urityfocus.com
Subject: Re: FreeBSD kernel buffer overflow


On Thu, Sep 16, 2004 at 11:48:21PM +0200, gerarra@....it wrote:

> Topic: Buffer Overflow in FreeBSD
> Versions: All the versions of FreeBSD are broken (4.x, 5.x, 6.0)
> Arch: x86
> Date: 16/09/2004

[snip]

Before this goes any further please read the thread[1] on hackers@ about
this.  It's not a security problem as you need root access to "exploit"
it anyways.

-- WXS

[1]
http://lists.freebsd.org/pipermail/freebsd-hackers/2004-September/008280.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ