Mailing List ArchiveSupport open source code!
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: tlug: FTP client buffer overflow [SECURITY]
- To: tlug@example.com
- Subject: Re: tlug: FTP client buffer overflow [SECURITY]
- From: Chris Sekiya <chris@example.com>
- Date: Thu, 17 Dec 1998 09:43:51 +0900 (JST)
- Content-Type: TEXT/PLAIN; charset=US-ASCII
- In-Reply-To: <Pine.LNX.3.96LJ1.1b7.981217092019.17300J-100000@example.com>
- Reply-To: tlug@example.com
- Sender: owner-tlug@example.com
On Thu, 17 Dec 1998, Scott Stone wrote: > Someone, I believe it was Christian Gafton at Redhat, found a buffer > overflow in the standard FTP client. Unless I'm greatly mistaken, this would only be a security risk if the ftp client in question is suid root (does _anyone_ do that?). Otherwise it's only an annoying bug. -- Chris ------------------------------------------------------------------ Next Nomikai: 15 January 1999, 19:30 Tengu TokyoEkiMae 03-3275-3691 Next Technical Meeting: 13 February, 12:30 Place: TBD ------------------------------------------------------------------ more info: http://tlug.linux.or.jp Sponsor: PHT
- Follow-Ups:
- Re: tlug: FTP client buffer overflow [SECURITY]
- From: Scott Stone <sstone@example.com>
- References:
- tlug: FTP client buffer overflow [SECURITY]
- From: Scott Stone <sstone@example.com>
Home | Main Index | Thread Index
- Prev by Date: tlug: FTP client buffer overflow [SECURITY]
- Next by Date: tlug: PCI Modems?
- Prev by thread: tlug: FTP client buffer overflow [SECURITY]
- Next by thread: Re: tlug: FTP client buffer overflow [SECURITY]
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links